
Information Gathering Techniques Quiz
Authored by Christopher Lipska
Computers
9th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
21 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of information is considered as personally identifiable information (PII) when gathered about employees during the reconnaissance phase?
Geographical information, entry control systems, and vendor traffic
Intellectual property, critical business functions, and management hierarchy
Names, phone numbers, email addresses, fax numbers, and addresses
Security policies and network mapping
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is included in physical security information gathered by malicious actors?
Names, contact information, and account numbers of vendors
Intellectual property, critical business functions, and management hierarchy
Geographical information, entry control systems, employee routines, and vendor traffic
Security policies and network mapping
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the focus of attackers when gathering information about an organization's information systems?
Employee personal details
Vendor contact information and account numbers
Intellectual property and critical business functions
Operating systems, applications, security policies, and network mapping
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes passive information gathering techniques used by attackers?
Directly interface with the organization's systems and leverage open-source tools
Pose a greater danger to malicious actors because of exposure
Rely on publicly available information sources such as the organization's website, brochures, press releases, etc.
Gather names, contact information, and account numbers of vendors
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a characteristic of active information gathering techniques?
Pose little risk for the malicious actors
Rely on publicly available information sources
Pose a greater danger to malicious actors because of exposure
Include geographical information and vendor traffic
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Google Earth primarily used for?
Providing a street view of houses, businesses, roadways, and topologies.
Streaming digital cameras that show video of places, people, and activity.
Providing current and historical satellite imagery of most locations.
Pulling information from social media postings.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the Wayback Machine offer?
A web mapping service that provides a street view.
A catalog of old site snapshots that may contain information removed from the internet.
A tool to find relationships between companies, people, email addresses, and other information.
A satellite imagery tool that provides images of locations.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?