Chapter Eight Practice Quiz - Info Sec

Chapter Eight Practice Quiz - Info Sec

12th Grade

65 Qs

quiz-placeholder

Similar activities

Central Processing Unit

Central Processing Unit

9th - 12th Grade

70 Qs

Bài tập về thiết kế website và giao tiếp trực tuyến

Bài tập về thiết kế website và giao tiếp trực tuyến

12th Grade

62 Qs

SUMMATIVE TEST in MIL (Q2, S.Y. 2025-2026)

SUMMATIVE TEST in MIL (Q2, S.Y. 2025-2026)

12th Grade

60 Qs

Knowledge Fitness Nov-25 Clinical

Knowledge Fitness Nov-25 Clinical

12th Grade

60 Qs

Intro Cyber Exam 5 (Modules 9-11)

Intro Cyber Exam 5 (Modules 9-11)

12th Grade

68 Qs

SECOND SUMMATIVE TEST IN COMPUTER SYSTEMS SERVICING 12

SECOND SUMMATIVE TEST IN COMPUTER SYSTEMS SERVICING 12

12th Grade

61 Qs

Quiz Teknologi Kabel Fiber Optik

Quiz Teknologi Kabel Fiber Optik

12th Grade - University

60 Qs

Input

Input

9th - 12th Grade

60 Qs

Chapter Eight Practice Quiz - Info Sec

Chapter Eight Practice Quiz - Info Sec

Assessment

Quiz

Information Technology (IT)

12th Grade

Practice Problem

Hard

Created by

Greg Michael

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

65 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is often referred to as the "weak link" in information security?

Firewalls

Antivirus software

People

Encryption methods

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack relies on manipulating people to gain information or access to facilities?

Phishing

Social engineering

Malware

Denial of Service

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common tactic used in social engineering attacks?

Sending sensitive information via unprotected channels

Handing over passwords

Posting important data in conspicuous places

Using strong encryption methods

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a social engineering attack where an attacker calls in a panicked voice and asks for sensitive information?

Phishing

Pretexting

Baiting

Tailgating

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the two primary sources of information to look at when protecting people and commercial organizations?

Human intelligence and open source intelligence

Firewalls and antivirus software

Encryption methods and secure passwords

Physical security and network security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Human Intelligence (HUMINT)?

Data gathered from electronic devices

Data gathered by talking to people

Data gathered from social media

Data gathered from job postings

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a method to collect HUMINT?

Observing people's schedules

Using torture

Tricking participants with scams

Analyzing job postings

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?