(a) is attempting to secretively discover private information about a person, company, or other entity.
Intro to IT Ch 10 Quiz Review

Quiz
•
Computers
•
9th - 12th Grade
•
Hard
Brett Kottmann
Used 2+ times
FREE Resource
34 questions
Show all answers
1.
DRAG AND DROP QUESTION
30 sec • 3 pts
Reconnaissance
Impersonation
Social Engineering
Answer explanation
While all the choices sound appropriate, snooping is the term associated with secretly trying to discover information.
Social Engineering is a broader term that covers multiple methods.
Reconnaissance is passive gathering of informatin, and may be secret or overt.
Impersonation is using technology to hijack conversations/data transfers.
2.
DRAG AND DROP QUESTION
20 sec • 3 pts
(a) covers many techniques that use deception to gain personal and/or private information for unlawful purposes.
Answer explanation
Pretexting is just one form of Social Engineering.
Wiretapping is using technology to intercept communication/data transfers.
Phishing is sending email that appears to be from a trusted source, hoping to obtain personal information like usernames and passwords.
3.
DRAG AND DROP QUESTION
30 sec • 3 pts
A(n) (a) attack involves a third-party intercepting your communications with an Internet server. They can then acquire information like usernames and passwords without arousing suspicion.
Answer explanation
4.
DROPDOWN QUESTION
30 sec • 3 pts
The goal of a (a) attack is to overload a system so that the services it provides are no longer available to legitimate network clients
Answer explanation
Denial of service (DOS) attacks are hard to defend against.
5.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
Which is NOT related to data availability?
Power outage
Hardware failure
Data destruction
Service outage
Social engineering
Answer explanation
In addition to confidentiality and integrity, IT professionals need to be concerned with the availability of important company data. If employees or customers are unable to access digital resources when they need them, companies lose valuable time and money.
All of the terms except social engineering are about data availability.
6.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
Internet users can expect complete and total privacy while using applications, social media, and cloud resources.
True
False
Answer explanation
Most people expect to have some measure of privacy in their daily lives. Most countries have laws that protect the privacy of their citizens. However, when the internet is involved, privacy is never a certainty. When you use the internet, your data travels through several networking devices is processed by dozens of software programs and protocols, each owned by someone else.
Therefore, it is important to understand that when using digital data, extra measures should be taken to protect information. In addition, it's important for a company to create policies, guidelines and procedures, that outline specific rules for protecting sensitive data. Such topics should include the use of social media, physical security requirements, and access to private information.
7.
DRAG AND DROP QUESTION
30 sec • 3 pts
(a) take advantage of people who use short, common words or combinations of these words as their passwords.
Answer explanation
Dictionary attacks take advantage of people who use short, common words or combinations of these words as their passwords. It's called a dictionary attack because some hackers can literally try every word in the dictionary! This is quite a long list as there are over one million words in the English language and over 3 million combinations of six letters.
To initiate the attack, the hacker tries a long list of common words, together with numbers before or after them like people often use. They sometimes use company usernames so that they can try passwords based on peoples' names. This type of attack only works when a site or program doesn't lock users out after a certain number of invalid attempts.
Sometimes, a dictionary attack is used to uncover the decryption key so that encrypted data can be decrypted and stolen in a traffic-interruption attack.
Create a free account and access millions of resources
Similar Resources on Quizizz
30 questions
Cybersecurity Suviksan Questions

Quiz
•
12th Grade
29 questions
IT Fundamentals: 6.0 Security

Quiz
•
11th - 12th Grade
30 questions
Cybersecurity General Review

Quiz
•
12th Grade
30 questions
Creating a Secure System (5.1 - 5.3)

Quiz
•
9th - 12th Grade
30 questions
The Essentials of Cyber Security

Quiz
•
11th Grade
31 questions
CIA Triad

Quiz
•
9th - 12th Grade
36 questions
2. Cybersecurity Awareness(AIE)

Quiz
•
11th Grade
33 questions
Network Security

Quiz
•
12th Grade
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade
Discover more resources for Computers
25 questions
Spanish preterite verbs (irregular/changed)

Quiz
•
9th - 10th Grade
10 questions
Identify Slope and y-intercept (from equation)

Quiz
•
8th - 9th Grade
10 questions
Juneteenth: History and Significance

Interactive video
•
7th - 12th Grade
8 questions
"Keeping the City of Venice Afloat" - STAAR Bootcamp, Day 1

Quiz
•
9th - 12th Grade
26 questions
June 19th

Quiz
•
4th - 9th Grade
20 questions
Distance, Midpoint, and Slope

Quiz
•
10th Grade
20 questions
Figurative Language Review

Quiz
•
10th Grade
27 questions
STAAR English 1 Review

Quiz
•
9th Grade