Skip to content

Check On learning

--- primaryColor: steelblue shuffleQuestions: false shuffleAnswers: true --- ### LSA 1-1: You receive a phone call stating you've won a contest, in order to redeem your prize, they need to verify your social security number. This example best demonstrates which of the following? - [ ] Phishing - [ ] Smishing - [x] Pretexting - [ ] Tailgating ### LSA 1-2 In cybersecurity, what refers to the exchange of goods, services, or favors for something of seemingly equal value between parties. - [ ] Blackmail - [x] Quid Pro Quo - [ ] Whaling - [ ] Equivalent Exchange ### LSA 2-1 Shredding any documents before throwing them in the trash helps mitigate which of the following? - [x] Dumpster Diving - [ ] Rubbage Rummaging - [ ] Sewage Searching - [ ] Garbage Grubbing ### LSA 2-2 Sometimes called "USB Dropping" this social engeneering tactic preys on the curiosity of individuals who find a USB flash drive. - [ ] Bribery - [ ] Whaling - [ ] Spear Phishing - [x] Road Apple ### LSA 3-1 This type of attack occurs when a user visits a compromised or malicious website, and malware is automatically downloaded and executed on their system. - [ ] Worm - [ ] Flash Virus - [X] Drive-by Download - [ ] Ransomware ### LSA 3-2 When implimented, what blocks access to known malicious websites or prevent users from downloading potentially harmful content. - [ ] Enpoint Security - [x] Web Filtering - [ ] Patch Management - [ ] White-listing ### LSA 4-1 ***(TRUE of FALSE)*** Employee training is one of the most effective ways to mitigate social engineering attempts. - [x] True - [ ] False