AP CSP Unit 8 Review Code.org

AP CSP Unit 8 Review Code.org

Assessment

Flashcard

Computers

9th - 12th Grade

Easy

Created by

Quizizz Content

Used 5+ times

FREE Resource

Student preview

quiz-placeholder

30 questions

Show all answers

1.

FLASHCARD QUESTION

Front

Which of the following is LEAST likely to indicate a phishing attack?
An e-mail from your bank asks you to call the number on your card to verify a transaction,
An e-mail from a merchant asks that you click on a link to reset your password,
An e-mail from a utility company asks you to enter your date of birth and social security number for verification purposes,
An e-mail indicates that you have won a large sum of money and asks you to enter your bank account number so that the money can be transferred to you

Back

An e-mail from your bank asks you to call the number on your card to verify a transaction

2.

FLASHCARD QUESTION

Front

Which of the following activities poses the greatest personal cybersecurity risk?
- Making a purchase at an online store that uses public key encryption to transmit credit card information
- Paying a bill using a secure electronic payment system
- Reserving a hotel room by e-mailing a credit card number to a hotel
- Withdrawing money from a bank account using an automated teller machine (ATM)

Back

Reserving a hotel room by e-mailing a credit card number to a hotel

3.

FLASHCARD QUESTION

Front

Which of the following best describes a Distributed Denial of Service (DDoS) attack? Options: An attempt by a country to deny its citizens access to the Internet, An attempt to deny users access to a Web site's resources by flooding the Web site with requests from multiple systems, An attempt by one user to deny service to another user by posting material on a social network, An attempt by a user of the Internet to get private information from a secure database

Back

An attempt to deny users access to a Web site's resources by flooding the Web site with requests from multiple systems

4.

FLASHCARD QUESTION

Front

Which of the following statements best describes the properties of public key encryption? Options: Public key encryption is an encryption method which relies on separate keys for encrypting and decrypting information., Public key encryption is a highly secure encryption scheme that in which a single key is used by both the sender and receiver of the message., Public key encryption makes use of certain types of problems which are easier for humans to solve than computers., Public key encryption makes use of mathematical problems which no algorithm can be used to solve.

Back

Public key encryption is an encryption method which relies on separate keys for encrypting and decrypting information.

5.

FLASHCARD QUESTION

Front

Which encoded ciphertext string decodes to an original plaintext message of “secret”? Options: ersecr, wigvix, kwujwl, oaynap

Back

oaynap

6.

FLASHCARD QUESTION

Front

Which of the following best defines confidentiality in context with information and data? Options: The ability to limit access to information to a certain set of users, The certainty that information is accurate, The confirmation that a company will not sell your information to others, The reliability of access to information

Back

The ability to limit access to information to a certain set of users

7.

FLASHCARD QUESTION

Front

Under what conditions may you reuse elements from a similar project found online?

Back

You may only reuse elements for which the original owner has granted a license to reuse, such as the Creative Commons Share Alike license.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?