IT Fundamentals Security Quiz

IT Fundamentals Security Quiz

9th Grade

11 Qs

quiz-placeholder

Similar activities

Technology & Ethics

Technology & Ethics

9th - 12th Grade

16 Qs

Confidentiality Concerns Quiz

Confidentiality Concerns Quiz

9th - 12th Grade

10 Qs

Cybersecurity Fund:  Unit 1 Review

Cybersecurity Fund: Unit 1 Review

9th - 12th Grade

15 Qs

2.1 ASK Kriptografi

2.1 ASK Kriptografi

9th Grade

8 Qs

Identity Theft

Identity Theft

8th - 12th Grade

12 Qs

2.6 - Compression

2.6 - Compression

9th - 10th Grade

10 Qs

Marquette's Business Game

Marquette's Business Game

9th - 12th Grade

12 Qs

Computers Check for Understanding

Computers Check for Understanding

8th - 12th Grade

10 Qs

IT Fundamentals Security Quiz

IT Fundamentals Security Quiz

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Suleyman D

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of security threat involves someone listening to private conversations without permission?

Social Engineering

Snooping

Eavesdropping

Hacking

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which activity involves gathering information from discarded materials?

Social Engineering

Phishing

Wiretapping

Dumpster Diving

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the CIA in the CIA Triad stand for?

Confidentiality, Integrity, and Accessibility

Confidentiality, Integrity, and Availability

Confidentiality, Information, and Accessibility

Confidentiality, Information, and Availability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an example of Personally Identifying Information (PII)?

Social Security Number

Driver's License Number

Email Address

Favorite Color

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of limiting the number of people who have access to each computer to its user and the IT administrator?

To increase the efficiency of the computer

To limit the opportunities for breaches of confidentiality

To reduce the cost of computer maintenance

To enhance the speed of the computer

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method is NOT typically associated with seeking unauthorized information?

Eavesdropping

Dumpster diving

Wiretapping

Public speaking

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is eavesdropping in the context of information security?

Monitoring network traffic to gain unauthorized access to data

Listening to someone's conversation without their knowledge

Encrypting data to prevent unauthorized access

Installing software to capture keystrokes on a computer

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?