G11 IT Security L2

G11 IT Security L2

12th Grade

10 Qs

quiz-placeholder

Similar activities

ETWINNING SID EVENT 24

ETWINNING SID EVENT 24

1st - 12th Grade

10 Qs

Data Validation

Data Validation

KG - Professional Development

11 Qs

Vertex AI Pipelines V1

Vertex AI Pipelines V1

12th Grade

10 Qs

Computer Programming Vocabulary-1

Computer Programming Vocabulary-1

KG - University

11 Qs

Server Administration- Quiz 1

Server Administration- Quiz 1

12th Grade - University

10 Qs

Technology Week HTG Quiz - Monday

Technology Week HTG Quiz - Monday

7th - 12th Grade

10 Qs

Thinglink

Thinglink

9th - 12th Grade

10 Qs

Data Engineering y BigQuery V1

Data Engineering y BigQuery V1

12th Grade

10 Qs

G11 IT Security L2

G11 IT Security L2

Assessment

Quiz

Computers

12th Grade

Practice Problem

Medium

Created by

Fritz Bansag

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is a way to manipulate or influence people with the goal to illegally obtain sensitive data.

Social Engineering

Computer Engineering

Data Capture

Information Engineering

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Tick all the implications of social engineering.

Information Gathering

Fraud

Computer System Access

Security Breach

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social Engineers research and learn about the personal environment of the target and fake their identify to obtain confidential information from the boss

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social Engineers research and learn about the personal environment of the target and fake their identify to obtain confidential information from the victim

True

False

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Tick all the methods of Social Engineering

Phone Calls

Credit Card

Phishing

Shoulder Surfing

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Tick all the methods of identity theft

Information diving

Skimming

Pretexting

Information surfing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the safeguarding of critical or confidential information by applying stringent access and control measures.

File Integrity

File security

Document Security

None of the choices

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?