G11 IT Security L2

G11 IT Security L2

12th Grade

10 Qs

quiz-placeholder

Similar activities

Unit 2, 2.1 information styles and their uses

Unit 2, 2.1 information styles and their uses

12th Grade

10 Qs

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

9th Grade - University

10 Qs

Cyber Security Unit 2 Exam

Cyber Security Unit 2 Exam

12th Grade

15 Qs

Staying Safe on the Internet

Staying Safe on the Internet

10th - 12th Grade

10 Qs

Unit 1 LO5 Ethical and Operational Issues and Threats

Unit 1 LO5 Ethical and Operational Issues and Threats

12th Grade

15 Qs

Identity Theft

Identity Theft

9th - 12th Grade

10 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

Understanding Cybersecurity Threats

Understanding Cybersecurity Threats

12th Grade

15 Qs

G11 IT Security L2

G11 IT Security L2

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Fritz Bansag

Used 8+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is a way to manipulate or influence people with the goal to illegally obtain sensitive data.

Social Engineering

Computer Engineering

Data Capture

Information Engineering

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Tick all the implications of social engineering.

Information Gathering

Fraud

Computer System Access

Security Breach

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social Engineers research and learn about the personal environment of the target and fake their identify to obtain confidential information from the boss

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social Engineers research and learn about the personal environment of the target and fake their identify to obtain confidential information from the victim

True

False

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Tick all the methods of Social Engineering

Phone Calls

Credit Card

Phishing

Shoulder Surfing

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Tick all the methods of identity theft

Information diving

Skimming

Pretexting

Information surfing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the safeguarding of critical or confidential information by applying stringent access and control measures.

File Integrity

File security

Document Security

None of the choices

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?