Intro to IT Ch 10 Quiz Review

Intro to IT Ch 10 Quiz Review

9th - 12th Grade

34 Qs

quiz-placeholder

Similar activities

ICT-Department-Grade5-November

ICT-Department-Grade5-November

5th Grade - University

29 Qs

NE Chapter 8

NE Chapter 8

12th Grade

30 Qs

ONE 6th FORM Unit 11 EoT Quiz Cyber Security

ONE 6th FORM Unit 11 EoT Quiz Cyber Security

12th Grade

30 Qs

AP CSP Cybersecurity

AP CSP Cybersecurity

9th - 12th Grade

33 Qs

Cybersecurity Ch1&2

Cybersecurity Ch1&2

9th - 12th Grade

39 Qs

2.1 PLTW Data Diligence

2.1 PLTW Data Diligence

9th Grade

37 Qs

HTTP Protocol Quiz

HTTP Protocol Quiz

12th Grade

29 Qs

Intro to IT Ch 10 Quiz Review

Intro to IT Ch 10 Quiz Review

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Brett Kottmann

Used 2+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

34 questions

Show all answers

1.

DRAG AND DROP QUESTION

30 sec • 3 pts

(a)   is attempting to secretively discover private information about a person, company, or other entity.

Snooping

Reconnaissance

Impersonation

Social Engineering

Answer explanation

Media Image

While all the choices sound appropriate, snooping is the term associated with secretly trying to discover information.

Social Engineering is a broader term that covers multiple methods.

Reconnaissance is passive gathering of informatin, and may be secret or overt.

Impersonation is using technology to hijack conversations/data transfers.

2.

DRAG AND DROP QUESTION

20 sec • 3 pts

​ (a)   covers many techniques that use deception to gain personal and/or private information for unlawful purposes.

Social Engineering
Wiretapping
Phishing
Pretexting

Answer explanation

Media Image

Pretexting is just one form of Social Engineering.

Wiretapping is using technology to intercept communication/data transfers.

Phishing is sending email that appears to be from a trusted source, hoping to obtain personal information like usernames and passwords.

3.

DRAG AND DROP QUESTION

30 sec • 3 pts

A(n) ​ (a)   attack involves a third-party intercepting your communications with an Internet server. They can then acquire information like usernames and passwords without arousing suspicion.

man-in-the-middle
impersonation
replay
phishing

Answer explanation

Media Image

4.

DROPDOWN QUESTION

30 sec • 3 pts

The goal of a ​ (a)   attack is to overload a system so that the services it provides are no longer available to legitimate network clients

denial of service
browser
phishing
social engineering

Answer explanation

Media Image

Denial of service (DOS) attacks are hard to defend against.

5.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which is NOT related to data availability?

Power outage

Hardware failure

Data destruction

Service outage

Social engineering

Answer explanation

Media Image

In addition to confidentiality and integrity, IT professionals need to be concerned with the availability of important company data. If employees or customers are unable to access digital resources when they need them, companies lose valuable time and money.

All of the terms except social engineering are about data availability.

6.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Internet users can expect complete and total privacy while using applications, social media, and cloud resources.

True

False

Answer explanation

Most people expect to have some measure of privacy in their daily lives. Most countries have laws that protect the privacy of their citizens. However, when the internet is involved, privacy is never a certainty. When you use the internet, your data travels through several networking devices is processed by dozens of software programs and protocols, each owned by someone else.

Therefore, it is important to understand that when using digital data, extra measures should be taken to protect information. In addition, it's important for a company to create policies, guidelines and procedures, that outline specific rules for protecting sensitive data. Such topics should include the use of social media, physical security requirements, and access to private information.

7.

DRAG AND DROP QUESTION

30 sec • 3 pts

​ (a)   take advantage of people who use short, common words or combinations of these words as their passwords.

Dictionary attacks
Phishing
Man-in-the-middle attacks
Brute force attacks

Answer explanation

Media Image

Dictionary attacks take advantage of people who use short, common words or combinations of these words as their passwords. It's called a dictionary attack because some hackers can literally try every word in the dictionary! This is quite a long list as there are over one million words in the English language and over 3 million combinations of six letters.

To initiate the attack, the hacker tries a long list of common words, together with numbers before or after them like people often use. They sometimes use company usernames so that they can try passwords based on peoples' names. This type of attack only works when a site or program doesn't lock users out after a certain number of invalid attempts.

Sometimes, a dictionary attack is used to uncover the decryption key so that encrypted data can be decrypted and stolen in a traffic-interruption attack.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?