Search Header Logo

Intro to Cybersecurity Quiz 3

Authored by Nicole Krysa

Computers

9th - 12th Grade

Used 11+ times

Intro to Cybersecurity Quiz 3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following steps of hacking might use a human in the target organization when hacking into a computer?

4. Escalating Priviledges

7. Installing Back Doors

6. Covering Tracks

3. Gaining Access

1. Recon

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a threat against the human factor in the technology enviroment?

Threat to a person physically

Threat to a person based on manipulation or deception

Answer explanation

Social engineering is used with the goal to get authorized users to give information or access to an unauthorized person.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes shoulder surfing?

Using a uniform or authority to get you to help them

Retrieving discarded information from trash

Reading info written in workspace, or in desk drawer

Looking when someone enters a secure code at an ATM, keypad, etc.

4.

OPEN ENDED QUESTION

3 mins • 1 pt

Explain a good habit that could stop someone from getting information from you through shoulder surfing.

Evaluate responses using AI:

OFF

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes pretexting?

Using a uniform or authority to get you to help them

Retrieving discarded information from trash

Reading info written in workspace, or in desk drawer

Looking when someone enters a secure code at an ATM, keypad, etc.

6.

OPEN ENDED QUESTION

3 mins • 1 pt

Explain a good habit that could stop someone from getting information from you through pretexting.

Example: If someone emailed you claiming to be Mr. Dreschel asking you for your Genesis login information, how could you check to make sure it is a valid request?

Evaluate responses using AI:

OFF

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes baiting?

Offering someone something of value, such as a prize

Retrieving discarded information from trash

Reading info written in workspace, or in desk drawer

Impersonating rushing or an "emergency"

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?