Which of the following steps of hacking might use a human in the target organization when hacking into a computer?

Intro to Cybersecurity Quiz 3

Quiz
•
Computers
•
9th - 12th Grade
•
Medium
Nicole Krysa
Used 11+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
4. Escalating Priviledges
7. Installing Back Doors
6. Covering Tracks
3. Gaining Access
1. Recon
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a threat against the human factor in the technology enviroment?
Threat to a person physically
Threat to a person based on manipulation or deception
Answer explanation
Social engineering is used with the goal to get authorized users to give information or access to an unauthorized person.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes shoulder surfing?
Using a uniform or authority to get you to help them
Retrieving discarded information from trash
Reading info written in workspace, or in desk drawer
Looking when someone enters a secure code at an ATM, keypad, etc.
4.
OPEN ENDED QUESTION
3 mins • 1 pt
Explain a good habit that could stop someone from getting information from you through shoulder surfing.
Evaluate responses using AI:
OFF
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes pretexting?
Using a uniform or authority to get you to help them
Retrieving discarded information from trash
Reading info written in workspace, or in desk drawer
Looking when someone enters a secure code at an ATM, keypad, etc.
6.
OPEN ENDED QUESTION
3 mins • 1 pt
Explain a good habit that could stop someone from getting information from you through pretexting.
Example: If someone emailed you claiming to be Mr. Dreschel asking you for your Genesis login information, how could you check to make sure it is a valid request?
Evaluate responses using AI:
OFF
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes baiting?
Offering someone something of value, such as a prize
Retrieving discarded information from trash
Reading info written in workspace, or in desk drawer
Impersonating rushing or an "emergency"
Create a free account and access millions of resources
Similar Resources on Quizizz
21 questions
G10 CS Sem 2 TA The Internet, AI, and Programming

Quiz
•
10th Grade
17 questions
Security and Ethics

Quiz
•
9th - 12th Grade
16 questions
CyberSafety Pre-Assessment

Quiz
•
KG - University
20 questions
History of Computers & Internet Quiz

Quiz
•
9th - 12th Grade
15 questions
ICT

Quiz
•
6th - 10th Grade
15 questions
Cyber Security Unit 2 Exam

Quiz
•
12th Grade
21 questions
AP-CSP Unit 4 Test Review

Quiz
•
11th - 12th Grade
20 questions
BTEC IT Unit 1 D: Malware and Other Attacks

Quiz
•
11th - 12th Grade
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade
Discover more resources for Computers
25 questions
Spanish preterite verbs (irregular/changed)

Quiz
•
9th - 10th Grade
10 questions
Identify Slope and y-intercept (from equation)

Quiz
•
8th - 9th Grade
10 questions
Juneteenth: History and Significance

Interactive video
•
7th - 12th Grade
8 questions
"Keeping the City of Venice Afloat" - STAAR Bootcamp, Day 1

Quiz
•
9th - 12th Grade
26 questions
June 19th

Quiz
•
4th - 9th Grade
20 questions
Distance, Midpoint, and Slope

Quiz
•
10th Grade
20 questions
Figurative Language Review

Quiz
•
10th Grade
27 questions
STAAR English 1 Review

Quiz
•
9th Grade