Search Header Logo

IT Fundamentals Security Quiz

Authored by Suleyman D

Computers

9th Grade

IT Fundamentals Security Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of security threat involves someone listening to private conversations without permission?

Social Engineering

Snooping

Eavesdropping

Hacking

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which activity involves gathering information from discarded materials?

Social Engineering

Phishing

Wiretapping

Dumpster Diving

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the CIA in the CIA Triad stand for?

Confidentiality, Integrity, and Accessibility

Confidentiality, Integrity, and Availability

Confidentiality, Information, and Accessibility

Confidentiality, Information, and Availability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an example of Personally Identifying Information (PII)?

Social Security Number

Driver's License Number

Email Address

Favorite Color

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of limiting the number of people who have access to each computer to its user and the IT administrator?

To increase the efficiency of the computer

To limit the opportunities for breaches of confidentiality

To reduce the cost of computer maintenance

To enhance the speed of the computer

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method is NOT typically associated with seeking unauthorized information?

Eavesdropping

Dumpster diving

Wiretapping

Public speaking

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is eavesdropping in the context of information security?

Monitoring network traffic to gain unauthorized access to data

Listening to someone's conversation without their knowledge

Encrypting data to prevent unauthorized access

Installing software to capture keystrokes on a computer

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?