Information Gathering Techniques Quiz

Information Gathering Techniques Quiz

9th Grade

21 Qs

quiz-placeholder

Similar activities

GCSE Computer Science 1.4 - Wired and Wireless Networks

GCSE Computer Science 1.4 - Wired and Wireless Networks

9th - 10th Grade

20 Qs

AP CSP Vocab #1

AP CSP Vocab #1

9th - 12th Grade

20 Qs

Network devices and monitoring

Network devices and monitoring

9th Grade - University

21 Qs

Computer Technology

Computer Technology

9th - 12th Grade

20 Qs

IT Fundamentals Networking

IT Fundamentals Networking

9th - 12th Grade

17 Qs

Motherboard Form Factors & Overview

Motherboard Form Factors & Overview

6th - 12th Grade

18 Qs

037_Misconfiguration Vulnerabilities – CompTIA Security+

037_Misconfiguration Vulnerabilities – CompTIA Security+

9th Grade - University

25 Qs

Computer Network

Computer Network

9th - 12th Grade

20 Qs

Information Gathering Techniques Quiz

Information Gathering Techniques Quiz

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Christopher Lipska

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of information is considered as personally identifiable information (PII) when gathered about employees during the reconnaissance phase?

Geographical information, entry control systems, and vendor traffic

Intellectual property, critical business functions, and management hierarchy

Names, phone numbers, email addresses, fax numbers, and addresses

Security policies and network mapping

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is included in physical security information gathered by malicious actors?

Names, contact information, and account numbers of vendors

Intellectual property, critical business functions, and management hierarchy

Geographical information, entry control systems, employee routines, and vendor traffic

Security policies and network mapping

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the focus of attackers when gathering information about an organization's information systems?

Employee personal details

Vendor contact information and account numbers

Intellectual property and critical business functions

Operating systems, applications, security policies, and network mapping

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes passive information gathering techniques used by attackers?

Directly interface with the organization's systems and leverage open-source tools

Pose a greater danger to malicious actors because of exposure

Rely on publicly available information sources such as the organization's website, brochures, press releases, etc.

Gather names, contact information, and account numbers of vendors

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a characteristic of active information gathering techniques?

Pose little risk for the malicious actors

Rely on publicly available information sources

Pose a greater danger to malicious actors because of exposure

Include geographical information and vendor traffic

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Google Earth primarily used for?

Providing a street view of houses, businesses, roadways, and topologies.

Streaming digital cameras that show video of places, people, and activity.

Providing current and historical satellite imagery of most locations.

Pulling information from social media postings.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the Wayback Machine offer?

A web mapping service that provides a street view.

A catalog of old site snapshots that may contain information removed from the internet.

A tool to find relationships between companies, people, email addresses, and other information.

A satellite imagery tool that provides images of locations.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?