
AP Cybersecurity: Topic 2.1 - Practice Quiz
Authored by Robert Giordano
Information Technology (IT)
12th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An individual in a high-visibility vest, claiming to be a fire inspector, shows up at an office unannounced and demands access to the server room for an "urgent safety check." The employee, intimidated, lets them in. This is a clear case of:
Tailgating
Piggybacking
Shoulder surfing
Dumpster diving
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
At a crowded airport charging station, a person plugs their phone in next to yours. You then enter your work laptop's complex password. Later, you learn the person had a small, high-resolution camera zoomed in on your keyboard from their seat. This is:
Card cloning
Social engineering
Shoulder surfing
Piggybacking
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A data center's operations are suddenly halted when a nearby river overflows its banks after a week of heavy rain, flooding the ground floor and destroying equipment. This is classified as:
A power disruption attack
A social engineering attack
A physical access vulnerability
A natural threat
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attacker finds a shredded, but poorly cross-cut, document in an office's recycling bin. By reassembling it, they discover a list of internal employee email addresses and phone numbers, which they later use for phishing. This attack is:
Shoulder surfing
Dumpster diving
Tailgating
Card cloning
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An employee leaves their building access card on their desk while they go to a meeting. A coworker with malicious intent briefly takes the card, swipes it through a small, portable device in their pocket, and then returns it. The device creates a perfect copy of the card's data. This is:
Card cloning
Piggybacking
Social engineering
Device destruction
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attacker gains access to an electrical room in an office building and physically cuts the labeled network cables leading to the company's main file server, causing a complete service outage. This is a form of:
Device destruction
Power disruption
A natural threat
Tailgating
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user is typing their password at a public computer in a library. An attacker, standing several feet behind them, simply watches their keystrokes to memorize the password. This is a low-tech version of:
Shoulder surfing
Piggybacking
Tailgating
Social engineering
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?