Chapter Eight Practice Quiz - Info Sec

Chapter Eight Practice Quiz - Info Sec

12th Grade

65 Qs

quiz-placeholder

Similar activities

Bridge Course_Grade8

Bridge Course_Grade8

8th Grade - University

69 Qs

IAS2_MIDTERM_EXAM_ 2ND_SEMESTER_SY.24_25

IAS2_MIDTERM_EXAM_ 2ND_SEMESTER_SY.24_25

12th Grade

60 Qs

Risk Management Quiz

Risk Management Quiz

12th Grade

68 Qs

Tik kelas x

Tik kelas x

11th Grade - University

60 Qs

ITE302c_SP24_Full

ITE302c_SP24_Full

12th Grade

67 Qs

Core practice quiz #7

Core practice quiz #7

12th Grade - University

64 Qs

A+ 1101 TCP/UDP protocols quiz

A+ 1101 TCP/UDP protocols quiz

12th Grade

61 Qs

Chapter Eight Practice Quiz - Info Sec

Chapter Eight Practice Quiz - Info Sec

Assessment

Quiz

Information Technology (IT)

12th Grade

Hard

Created by

Greg Michael

FREE Resource

65 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is often referred to as the "weak link" in information security?

Firewalls

Antivirus software

People

Encryption methods

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack relies on manipulating people to gain information or access to facilities?

Phishing

Social engineering

Malware

Denial of Service

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common tactic used in social engineering attacks?

Sending sensitive information via unprotected channels

Handing over passwords

Posting important data in conspicuous places

Using strong encryption methods

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a social engineering attack where an attacker calls in a panicked voice and asks for sensitive information?

Phishing

Pretexting

Baiting

Tailgating

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the two primary sources of information to look at when protecting people and commercial organizations?

Human intelligence and open source intelligence

Firewalls and antivirus software

Encryption methods and secure passwords

Physical security and network security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Human Intelligence (HUMINT)?

Data gathered from electronic devices

Data gathered by talking to people

Data gathered from social media

Data gathered from job postings

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a method to collect HUMINT?

Observing people's schedules

Using torture

Tricking participants with scams

Analyzing job postings

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?