Information Gathering Techniques Quiz

Information Gathering Techniques Quiz

9th Grade

21 Qs

quiz-placeholder

Similar activities

Computer Parts Quiz

Computer Parts Quiz

9th - 12th Grade

18 Qs

Computer Basics

Computer Basics

7th - 9th Grade

20 Qs

Resiliency and Site Security

Resiliency and Site Security

9th Grade - University

25 Qs

GCSE Wired and Wireless Networks

GCSE Wired and Wireless Networks

9th - 11th Grade

22 Qs

Cyber Security Unit 3 Exam

Cyber Security Unit 3 Exam

9th Grade

20 Qs

Computer Technology

Computer Technology

9th - 12th Grade

20 Qs

Internet Services

Internet Services

6th - 12th Grade

16 Qs

Switch Ports

Switch Ports

9th - 12th Grade

25 Qs

Information Gathering Techniques Quiz

Information Gathering Techniques Quiz

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Christopher Lipska

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of information is considered as personally identifiable information (PII) when gathered about employees during the reconnaissance phase?

Geographical information, entry control systems, and vendor traffic

Intellectual property, critical business functions, and management hierarchy

Names, phone numbers, email addresses, fax numbers, and addresses

Security policies and network mapping

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is included in physical security information gathered by malicious actors?

Names, contact information, and account numbers of vendors

Intellectual property, critical business functions, and management hierarchy

Geographical information, entry control systems, employee routines, and vendor traffic

Security policies and network mapping

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the focus of attackers when gathering information about an organization's information systems?

Employee personal details

Vendor contact information and account numbers

Intellectual property and critical business functions

Operating systems, applications, security policies, and network mapping

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes passive information gathering techniques used by attackers?

Directly interface with the organization's systems and leverage open-source tools

Pose a greater danger to malicious actors because of exposure

Rely on publicly available information sources such as the organization's website, brochures, press releases, etc.

Gather names, contact information, and account numbers of vendors

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a characteristic of active information gathering techniques?

Pose little risk for the malicious actors

Rely on publicly available information sources

Pose a greater danger to malicious actors because of exposure

Include geographical information and vendor traffic

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Google Earth primarily used for?

Providing a street view of houses, businesses, roadways, and topologies.

Streaming digital cameras that show video of places, people, and activity.

Providing current and historical satellite imagery of most locations.

Pulling information from social media postings.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the Wayback Machine offer?

A web mapping service that provides a street view.

A catalog of old site snapshots that may contain information removed from the internet.

A tool to find relationships between companies, people, email addresses, and other information.

A satellite imagery tool that provides images of locations.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?