Chapter Eight Practice Quiz - Info Sec

Chapter Eight Practice Quiz - Info Sec

12th Grade

65 Qs

quiz-placeholder

Similar activities

EDPM QUIZ T1 2024

EDPM QUIZ T1 2024

9th - 12th Grade

60 Qs

Latihan AAS Ganjil kls 8

Latihan AAS Ganjil kls 8

8th Grade - University

60 Qs

Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

62 Qs

Core practice quiz #7

Core practice quiz #7

12th Grade - University

64 Qs

A+ 1101 TCP/UDP protocols quiz

A+ 1101 TCP/UDP protocols quiz

12th Grade

61 Qs

Chapter Seven Practice Quiz - Info Sec

Chapter Seven Practice Quiz - Info Sec

12th Grade

62 Qs

Year 12 2025 Trial HSC Exam Prep

Year 12 2025 Trial HSC Exam Prep

12th Grade - University

65 Qs

IAS2_MIDTERM_EXAM_ 2ND_SEMESTER_SY.24_25

IAS2_MIDTERM_EXAM_ 2ND_SEMESTER_SY.24_25

12th Grade

60 Qs

Chapter Eight Practice Quiz - Info Sec

Chapter Eight Practice Quiz - Info Sec

Assessment

Quiz

Information Technology (IT)

12th Grade

Hard

Created by

Greg Michael

FREE Resource

65 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is often referred to as the "weak link" in information security?

Firewalls

Antivirus software

People

Encryption methods

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack relies on manipulating people to gain information or access to facilities?

Phishing

Social engineering

Malware

Denial of Service

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common tactic used in social engineering attacks?

Sending sensitive information via unprotected channels

Handing over passwords

Posting important data in conspicuous places

Using strong encryption methods

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a social engineering attack where an attacker calls in a panicked voice and asks for sensitive information?

Phishing

Pretexting

Baiting

Tailgating

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the two primary sources of information to look at when protecting people and commercial organizations?

Human intelligence and open source intelligence

Firewalls and antivirus software

Encryption methods and secure passwords

Physical security and network security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Human Intelligence (HUMINT)?

Data gathered from electronic devices

Data gathered by talking to people

Data gathered from social media

Data gathered from job postings

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a method to collect HUMINT?

Observing people's schedules

Using torture

Tricking participants with scams

Analyzing job postings

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?