Which of the following would pose the greatest threat to a user's personal privacy if it were to be leaked to the public? The IP address of the user’s computer, The user's browser cookies, The user's email address, The user's public key for encryption
Cybersecurity - Assessment Review - SGM #2

Flashcard
•
Information Technology (IT)
•
9th Grade
•
Hard
Quizizz Content
FREE Resource
Student preview

19 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Back
The user's public key for encryption
2.
FLASHCARD QUESTION
Front
In the context of password generation, for what does the acronym OTP stand?
Back
One-time password
3.
FLASHCARD QUESTION
Front
In 2017, the credit report company Equifax suffered a data breach that exposed the PII of more than 100 million Americans to attackers. The exposed data included names, home addresses, phone numbers, dates of birth, Social Security numbers, and driver's licence numbers. With access to only that information, which of these actions could not be taken by an attacker? An attacker could sell the Social Security numbers to another attacker on the Internet; An attacker could send an email to an affected person that contained their PII and a threat to reveal them; An attacker could post the home addresses on a public website; An attacker could steal the identity of one of the affected people.
Back
An attacker could send an email to an affected person that contained their PII and a threat to reveal them.
4.
FLASHCARD QUESTION
Front
Which of the following could not occur if your computer is connected to the Internet over a rogue access point?
- The rogue access point could analyze the types of websites you visit
- The rogue access point could modify the contents of your connection to a website
- The rogue access point could see what keywords you're searching for on a web search engine
- The rogue access point could read the files on your device
Back
The rogue access point could read the files on your device
5.
FLASHCARD QUESTION
Front
Why is a computer virus more dangerous than other types of malware?
Back
A virus can make copies of itself, including copying itself into an existing file.
6.
FLASHCARD QUESTION
Front
Dorothy is a network administrator. Her system has been experimenting with an attack that is using bots to send fake requests to the cloud resources her company uses. This is causing disruption of the availabilities of these resources. How is this attack best described?
Back
DDoS
7.
FLASHCARD QUESTION
Front
Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are used? Unauthorized individuals can deny service to a computing system by overwhelming the system with login attempts, Unauthorized individuals can exploit vulnerabilities in compression algorithms to determine a user’s password from their decompressed data, Unauthorized individuals can exploit vulnerabilities in encryption algorithms to determine a user’s password from their encryption key, Unauthorized individuals can use data mining and other techniques to guess a user’s password.
Back
Unauthorized individuals can use data mining and other techniques to guess a user’s password.
Create a free account and access millions of resources
Similar Resources on Quizizz
15 questions
Engineering Design Process

Flashcard
•
9th Grade
12 questions
Computers 101 - ESL vocabulary

Flashcard
•
9th Grade
11 questions
CC 6:14 - 6:19 Terms

Flashcard
•
9th Grade
17 questions
Internet Safety Review

Flashcard
•
9th Grade
17 questions
Internet Safety Review

Flashcard
•
9th Grade
12 questions
NAT for IPV4

Flashcard
•
10th Grade
15 questions

Flashcard
•
10th Grade
14 questions
CodeHS: Unit6 - JavaScript Basics

Flashcard
•
9th Grade
Popular Resources on Quizizz
20 questions
math review

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
10 questions
Human Body Systems and Functions

Interactive video
•
6th - 8th Grade
19 questions
Math Review

Quiz
•
3rd Grade
45 questions
7th Grade Math EOG Review

Quiz
•
7th Grade
Discover more resources for Information Technology (IT)
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
20 questions
Investing

Quiz
•
9th - 12th Grade
20 questions
EOC Math 1 Review

Quiz
•
9th Grade
20 questions
Insurance

Quiz
•
9th - 12th Grade
20 questions
MCAS Biology Review

Quiz
•
9th - 10th Grade
20 questions
Paying for College

Quiz
•
9th - 12th Grade
20 questions
Math 1 EOC Review

Quiz
•
9th Grade