Chapter Eight Practice Quiz - Info Sec

Chapter Eight Practice Quiz - Info Sec

12th Grade

65 Qs

quiz-placeholder

Similar activities

Tik kelas x

Tik kelas x

11th Grade - University

60 Qs

Core practice quiz #7

Core practice quiz #7

12th Grade - University

64 Qs

IT2 SHS 1st Quarter Exam

IT2 SHS 1st Quarter Exam

12th Grade

70 Qs

A+ 1101 TCP/UDP protocols quiz

A+ 1101 TCP/UDP protocols quiz

12th Grade

61 Qs

IAS2_MIDTERM_EXAM_ 2ND_SEMESTER_SY.24_25

IAS2_MIDTERM_EXAM_ 2ND_SEMESTER_SY.24_25

12th Grade

60 Qs

Android Development Multiple Choice Questions (21-40)

Android Development Multiple Choice Questions (21-40)

12th Grade

60 Qs

Computer Basics Quiz

Computer Basics Quiz

12th Grade

66 Qs

Chapter Eight Practice Quiz - Info Sec

Chapter Eight Practice Quiz - Info Sec

Assessment

Quiz

Information Technology (IT)

12th Grade

Hard

Created by

Greg Michael

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

65 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is often referred to as the "weak link" in information security?

Firewalls

Antivirus software

People

Encryption methods

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack relies on manipulating people to gain information or access to facilities?

Phishing

Social engineering

Malware

Denial of Service

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common tactic used in social engineering attacks?

Sending sensitive information via unprotected channels

Handing over passwords

Posting important data in conspicuous places

Using strong encryption methods

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a social engineering attack where an attacker calls in a panicked voice and asks for sensitive information?

Phishing

Pretexting

Baiting

Tailgating

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the two primary sources of information to look at when protecting people and commercial organizations?

Human intelligence and open source intelligence

Firewalls and antivirus software

Encryption methods and secure passwords

Physical security and network security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Human Intelligence (HUMINT)?

Data gathered from electronic devices

Data gathered by talking to people

Data gathered from social media

Data gathered from job postings

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a method to collect HUMINT?

Observing people's schedules

Using torture

Tricking participants with scams

Analyzing job postings

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?