Information Gathering Techniques Quiz

Information Gathering Techniques Quiz

9th Grade

21 Qs

quiz-placeholder

Similar activities

CySa+ PT5: 3 of 3

CySa+ PT5: 3 of 3

9th Grade - Professional Development

20 Qs

Networking Ch 11 Quiz Review

Networking Ch 11 Quiz Review

9th - 12th Grade

20 Qs

1.4 Wired & Wifi Networks

1.4 Wired & Wifi Networks

9th Grade

19 Qs

Networking v6 Ch 14 Quiz Review

Networking v6 Ch 14 Quiz Review

9th - 12th Grade

19 Qs

Computer Technology

Computer Technology

9th - 12th Grade

20 Qs

WJEC GCSE Computer Science - Security

WJEC GCSE Computer Science - Security

9th - 10th Grade

18 Qs

Motherboard Form Factors & Overview

Motherboard Form Factors & Overview

6th - 12th Grade

18 Qs

OCR Computer Science Networks

OCR Computer Science Networks

9th Grade

19 Qs

Information Gathering Techniques Quiz

Information Gathering Techniques Quiz

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Christopher Lipska

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of information is considered as personally identifiable information (PII) when gathered about employees during the reconnaissance phase?

Geographical information, entry control systems, and vendor traffic

Intellectual property, critical business functions, and management hierarchy

Names, phone numbers, email addresses, fax numbers, and addresses

Security policies and network mapping

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is included in physical security information gathered by malicious actors?

Names, contact information, and account numbers of vendors

Intellectual property, critical business functions, and management hierarchy

Geographical information, entry control systems, employee routines, and vendor traffic

Security policies and network mapping

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the focus of attackers when gathering information about an organization's information systems?

Employee personal details

Vendor contact information and account numbers

Intellectual property and critical business functions

Operating systems, applications, security policies, and network mapping

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes passive information gathering techniques used by attackers?

Directly interface with the organization's systems and leverage open-source tools

Pose a greater danger to malicious actors because of exposure

Rely on publicly available information sources such as the organization's website, brochures, press releases, etc.

Gather names, contact information, and account numbers of vendors

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a characteristic of active information gathering techniques?

Pose little risk for the malicious actors

Rely on publicly available information sources

Pose a greater danger to malicious actors because of exposure

Include geographical information and vendor traffic

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Google Earth primarily used for?

Providing a street view of houses, businesses, roadways, and topologies.

Streaming digital cameras that show video of places, people, and activity.

Providing current and historical satellite imagery of most locations.

Pulling information from social media postings.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the Wayback Machine offer?

A web mapping service that provides a street view.

A catalog of old site snapshots that may contain information removed from the internet.

A tool to find relationships between companies, people, email addresses, and other information.

A satellite imagery tool that provides images of locations.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?