
G11 IT Security L2
Authored by Fritz Bansag
Computers
12th Grade
Used 9+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Is a way to manipulate or influence people with the goal to illegally obtain sensitive data.
Social Engineering
Computer Engineering
Data Capture
Information Engineering
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Tick all the implications of social engineering.
Information Gathering
Fraud
Computer System Access
Security Breach
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Social Engineers research and learn about the personal environment of the target and fake their identify to obtain confidential information from the boss
True
False
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Social Engineers research and learn about the personal environment of the target and fake their identify to obtain confidential information from the victim
True
False
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Tick all the methods of Social Engineering
Phone Calls
Credit Card
Phishing
Shoulder Surfing
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Tick all the methods of identity theft
Information diving
Skimming
Pretexting
Information surfing
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is the safeguarding of critical or confidential information by applying stringent access and control measures.
File Integrity
File security
Document Security
None of the choices
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?