AP Cybersecurity: Topic 2.1 - Practice Quiz

AP Cybersecurity: Topic 2.1 - Practice Quiz

12th Grade

20 Qs

quiz-placeholder

Similar activities

Scratch Pre-knowledge

Scratch Pre-knowledge

3rd Grade - University

15 Qs

Tổng kết CLB Minecraft Education

Tổng kết CLB Minecraft Education

1st Grade - University

20 Qs

DBMS Introductory Quiz

DBMS Introductory Quiz

12th Grade

15 Qs

Testează-ți cunoștințele despre numerație

Testează-ți cunoștințele despre numerație

11th Grade - University

15 Qs

Understanding Loops in C Programming

Understanding Loops in C Programming

1st Grade - University

15 Qs

LATIHAN PSAJ DPK TJKT

LATIHAN PSAJ DPK TJKT

12th Grade

20 Qs

Quiz sobre Computadores

Quiz sobre Computadores

12th Grade

16 Qs

RIAN OCTAVIANTI

RIAN OCTAVIANTI

9th - 12th Grade

20 Qs

AP Cybersecurity: Topic 2.1 - Practice Quiz

AP Cybersecurity: Topic 2.1 - Practice Quiz

Assessment

Quiz

Information Technology (IT)

12th Grade

Practice Problem

Easy

Created by

Robert Giordano

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An individual in a high-visibility vest, claiming to be a fire inspector, shows up at an office unannounced and demands access to the server room for an "urgent safety check." The employee, intimidated, lets them in. This is a clear case of:

Tailgating

Piggybacking

Shoulder surfing

Dumpster diving

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

At a crowded airport charging station, a person plugs their phone in next to yours. You then enter your work laptop's complex password. Later, you learn the person had a small, high-resolution camera zoomed in on your keyboard from their seat. This is:

Card cloning

Social engineering

Shoulder surfing

Piggybacking

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A data center's operations are suddenly halted when a nearby river overflows its banks after a week of heavy rain, flooding the ground floor and destroying equipment. This is classified as:

A power disruption attack

A social engineering attack

A physical access vulnerability

A natural threat

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker finds a shredded, but poorly cross-cut, document in an office's recycling bin. By reassembling it, they discover a list of internal employee email addresses and phone numbers, which they later use for phishing. This attack is:

Shoulder surfing

Dumpster diving

Tailgating

Card cloning

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee leaves their building access card on their desk while they go to a meeting. A coworker with malicious intent briefly takes the card, swipes it through a small, portable device in their pocket, and then returns it. The device creates a perfect copy of the card's data. This is:

Card cloning

Piggybacking

Social engineering

Device destruction

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker gains access to an electrical room in an office building and physically cuts the labeled network cables leading to the company's main file server, causing a complete service outage. This is a form of:

Device destruction

Power disruption

A natural threat

Tailgating

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user is typing their password at a public computer in a library. An attacker, standing several feet behind them, simply watches their keystrokes to memorize the password. This is a low-tech version of:

Shoulder surfing

Piggybacking

Tailgating

Social engineering

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?