Search Header Logo

AP Cybersecurity: Topic 2.1 - Practice Quiz

Authored by Robert Giordano

Information Technology (IT)

12th Grade

Used 4+ times

AP Cybersecurity: Topic 2.1 - Practice Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An individual in a high-visibility vest, claiming to be a fire inspector, shows up at an office unannounced and demands access to the server room for an "urgent safety check." The employee, intimidated, lets them in. This is a clear case of:

Tailgating

Piggybacking

Shoulder surfing

Dumpster diving

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

At a crowded airport charging station, a person plugs their phone in next to yours. You then enter your work laptop's complex password. Later, you learn the person had a small, high-resolution camera zoomed in on your keyboard from their seat. This is:

Card cloning

Social engineering

Shoulder surfing

Piggybacking

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A data center's operations are suddenly halted when a nearby river overflows its banks after a week of heavy rain, flooding the ground floor and destroying equipment. This is classified as:

A power disruption attack

A social engineering attack

A physical access vulnerability

A natural threat

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker finds a shredded, but poorly cross-cut, document in an office's recycling bin. By reassembling it, they discover a list of internal employee email addresses and phone numbers, which they later use for phishing. This attack is:

Shoulder surfing

Dumpster diving

Tailgating

Card cloning

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee leaves their building access card on their desk while they go to a meeting. A coworker with malicious intent briefly takes the card, swipes it through a small, portable device in their pocket, and then returns it. The device creates a perfect copy of the card's data. This is:

Card cloning

Piggybacking

Social engineering

Device destruction

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker gains access to an electrical room in an office building and physically cuts the labeled network cables leading to the company's main file server, causing a complete service outage. This is a form of:

Device destruction

Power disruption

A natural threat

Tailgating

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user is typing their password at a public computer in a library. An attacker, standing several feet behind them, simply watches their keystrokes to memorize the password. This is a low-tech version of:

Shoulder surfing

Piggybacking

Tailgating

Social engineering

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?