1. Select the mobile malware that best matches the scenario text.
- You just downloaded and installed a free game and suddenly a new “search” toolbar has appeared in your browser. – Adware
- You booted your computer and it is displaying a page that states your files are encrypted and that you must send Bitcoins to decrypt your hard drive. – Ransomware
- A cybercriminal has installed a very hard to detect malware on your computer to gain system-level privileges and can now control it remotely. – Rootkit
- Whenever you access a secure site on your computer, a program is secretly capturing the login credentials and sending them to a cybercriminal. – Spyware
- After visiting a free gaming site, your computer displayed a pop-up window saying it discovered several viruses and to fix it you must download and run the free antivirus software. You download and scan your computer and it reports that all viruses have been removed. However, the free antivirus software installed a backdoor application allowing a cybercriminal access to your host. – Trojan horse
- You opened an email attachment and suddenly your computer shut down. You try to reboot it but it keeps shutting down. – Virus
- The corporate network is suddenly very noticeably slow and unresponsive. – Worm
2. Match the malware to the respective description.
3. Match the term with the respective description.
4. Match TCP/IP attack type to the respective description.
5. Select the social engineering technique that best matches the scenario text.
- You found a USB drive in the parking lot and inserted it into your laptop unknowingly installing malware on your computer. – Baiting
- An attacker has just retrieved hard copies of recently outdated device configuration files from a trash bin. – Dumpster diving
- A person claiming to be from your heating and ventilation contractor asks you if you could let him into a secure area. – Impersonation
- You received an email from your bank stating that your account has been compromised and that you should click an enclosed link to rectify the problem. When you click, you unknowingly just installed malware on your device. – Phishing
- Your “bank” calls you to say your account may be compromised and they would like to confirm your identity by requesting your personal and financial data. – Pretexting
- You notice a fellow employee purposely overlooking your supervisor’s shoulder as they are entering their login credentials. – Shoulder surfing
- You received a survey in an email for a cool free t-shirt in which you have to provide personal identifiable information. – Something for Something
- An attacker sends malicious emails containing harmful links, malware, or deceptive content to a large number of random individuals. – Spam
- An attacker has created a targeted phishing attack tailored specifically for the chief executive officer of a large organization. – Spear phishing
- A person you have never seen before has quickly followed you into a secure building entrance saying that he forgot his security badge. – Tailgating
6. Match the attack type with the respective description.
7. Match the locking mechanism term to the respective description.
8. Match the data protection term to the respective description.
9. Match the statement with True or False category.
- Setting a BIOS or UEFI password can prevent someone from altering the configured settings – True
- Dynamic lock is a feature that makes Windows lock when a pre-paired device such as a cell phone goes out of range of the PC – True
- The PIN feature enables Windows to use facial recognition or use your fingerprint to access Windows – False
- Local passwords can be managed under Control Panel > Personalization – False
10. Match the Local Security Policy related statement to the respective true of false category.
Use Account Policies > Password Policy to prevent brute force attacks.
The Local Security Policy can export an extensive configured local policy from one Windows host to another.
Use the Local Policies > Audit Policy to log successful and unsuccessful login attempt.
11. Match the Windows 10 OS term with the respective description.
12. Match the term with the respective description.
13. Match the term to the respective description.
14. Match the Windows 10 OS term with the respective description.
15. Select the network security term that best matches the scenario text.
- In a local restaurant, you notice a sign that says “Free WiFi”. Looking at your phone, you see a network called “ForOurGuests”. – SSID
- You notice a wireless network named StaffOnly with a lock symbol on it. When you try to connect, a password prompt appears. – WPA
- A cybercriminal has requested port forwarding targeting your internal network printer. – UPnP
- An email from your wireless router manufacturer warns of a vulnerability and recommends that you update the device. – Firmware
- After learning about remote vulnerabilities, you decide to install a device that carefully monitors and filters network traffic. – Firewall