AP Cybersecurity: Topic 2.1 - Practice Quiz

AP Cybersecurity: Topic 2.1 - Practice Quiz

12th Grade

20 Qs

quiz-placeholder

Similar activities

Eva_Est_P1_11_PMV

Eva_Est_P1_11_PMV

4th Grade - University

20 Qs

11° Prueba Integral 1P 2025

11° Prueba Integral 1P 2025

11th Grade - University

16 Qs

Latihan Soal Informatika

Latihan Soal Informatika

8th Grade - University

17 Qs

soal microsoft word

soal microsoft word

9th - 12th Grade

20 Qs

ĐỀ CƯƠNG ÔN TẬP CUỐI HỌC KÌ 2 LỚP 5

ĐỀ CƯƠNG ÔN TẬP CUỐI HỌC KÌ 2 LỚP 5

5th Grade - University

20 Qs

ATS INFORMATIKA GENAP 2025

ATS INFORMATIKA GENAP 2025

12th Grade

20 Qs

Quiz Pemrograman Python

Quiz Pemrograman Python

12th Grade

17 Qs

Elicitación de requisitos de software, metodología de desarrollo

Elicitación de requisitos de software, metodología de desarrollo

1st Grade - University

18 Qs

AP Cybersecurity: Topic 2.1 - Practice Quiz

AP Cybersecurity: Topic 2.1 - Practice Quiz

Assessment

Quiz

Information Technology (IT)

12th Grade

Practice Problem

Easy

Created by

Robert Giordano

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An individual in a high-visibility vest, claiming to be a fire inspector, shows up at an office unannounced and demands access to the server room for an "urgent safety check." The employee, intimidated, lets them in. This is a clear case of:

Tailgating

Piggybacking

Shoulder surfing

Dumpster diving

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

At a crowded airport charging station, a person plugs their phone in next to yours. You then enter your work laptop's complex password. Later, you learn the person had a small, high-resolution camera zoomed in on your keyboard from their seat. This is:

Card cloning

Social engineering

Shoulder surfing

Piggybacking

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A data center's operations are suddenly halted when a nearby river overflows its banks after a week of heavy rain, flooding the ground floor and destroying equipment. This is classified as:

A power disruption attack

A social engineering attack

A physical access vulnerability

A natural threat

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker finds a shredded, but poorly cross-cut, document in an office's recycling bin. By reassembling it, they discover a list of internal employee email addresses and phone numbers, which they later use for phishing. This attack is:

Shoulder surfing

Dumpster diving

Tailgating

Card cloning

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee leaves their building access card on their desk while they go to a meeting. A coworker with malicious intent briefly takes the card, swipes it through a small, portable device in their pocket, and then returns it. The device creates a perfect copy of the card's data. This is:

Card cloning

Piggybacking

Social engineering

Device destruction

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker gains access to an electrical room in an office building and physically cuts the labeled network cables leading to the company's main file server, causing a complete service outage. This is a form of:

Device destruction

Power disruption

A natural threat

Tailgating

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user is typing their password at a public computer in a library. An attacker, standing several feet behind them, simply watches their keystrokes to memorize the password. This is a low-tech version of:

Shoulder surfing

Piggybacking

Tailgating

Social engineering

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?