
Intro to Cybersecurity Quiz 3
Authored by Nicole Krysa
Computers
9th - 12th Grade
Used 11+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following steps of hacking might use a human in the target organization when hacking into a computer?
4. Escalating Priviledges
7. Installing Back Doors
6. Covering Tracks
3. Gaining Access
1. Recon
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a threat against the human factor in the technology enviroment?
Threat to a person physically
Threat to a person based on manipulation or deception
Answer explanation
Social engineering is used with the goal to get authorized users to give information or access to an unauthorized person.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes shoulder surfing?
Using a uniform or authority to get you to help them
Retrieving discarded information from trash
Reading info written in workspace, or in desk drawer
Looking when someone enters a secure code at an ATM, keypad, etc.
4.
OPEN ENDED QUESTION
3 mins • 1 pt
Explain a good habit that could stop someone from getting information from you through shoulder surfing.
Evaluate responses using AI:
OFF
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes pretexting?
Using a uniform or authority to get you to help them
Retrieving discarded information from trash
Reading info written in workspace, or in desk drawer
Looking when someone enters a secure code at an ATM, keypad, etc.
6.
OPEN ENDED QUESTION
3 mins • 1 pt
Explain a good habit that could stop someone from getting information from you through pretexting.
Example: If someone emailed you claiming to be Mr. Dreschel asking you for your Genesis login information, how could you check to make sure it is a valid request?
Evaluate responses using AI:
OFF
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes baiting?
Offering someone something of value, such as a prize
Retrieving discarded information from trash
Reading info written in workspace, or in desk drawer
Impersonating rushing or an "emergency"
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?