
Cybersecurity - Assessment Review - SGM #2
Flashcard
•
Information Technology (IT)
•
9th Grade
•
Hard
Wayground Content
FREE Resource
Student preview

19 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Which of the following would pose the greatest threat to a user's personal privacy if it were to be leaked to the public? The IP address of the user’s computer, The user's browser cookies, The user's email address, The user's public key for encryption
Back
The user's public key for encryption
2.
FLASHCARD QUESTION
Front
In the context of password generation, for what does the acronym OTP stand?
Back
One-time password
3.
FLASHCARD QUESTION
Front
In 2017, the credit report company Equifax suffered a data breach that exposed the PII of more than 100 million Americans to attackers. The exposed data included names, home addresses, phone numbers, dates of birth, Social Security numbers, and driver's licence numbers. With access to only that information, which of these actions could not be taken by an attacker? An attacker could sell the Social Security numbers to another attacker on the Internet; An attacker could send an email to an affected person that contained their PII and a threat to reveal them; An attacker could post the home addresses on a public website; An attacker could steal the identity of one of the affected people.
Back
An attacker could send an email to an affected person that contained their PII and a threat to reveal them.
4.
FLASHCARD QUESTION
Front
Which of the following could not occur if your computer is connected to the Internet over a rogue access point?
- The rogue access point could analyze the types of websites you visit
- The rogue access point could modify the contents of your connection to a website
- The rogue access point could see what keywords you're searching for on a web search engine
- The rogue access point could read the files on your device
Back
The rogue access point could read the files on your device
5.
FLASHCARD QUESTION
Front
Why is a computer virus more dangerous than other types of malware?
Back
A virus can make copies of itself, including copying itself into an existing file.
6.
FLASHCARD QUESTION
Front
Dorothy is a network administrator. Her system has been experimenting with an attack that is using bots to send fake requests to the cloud resources her company uses. This is causing disruption of the availabilities of these resources. How is this attack best described?
Back
DDoS
7.
FLASHCARD QUESTION
Front
Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are used? Unauthorized individuals can deny service to a computing system by overwhelming the system with login attempts, Unauthorized individuals can exploit vulnerabilities in compression algorithms to determine a user’s password from their decompressed data, Unauthorized individuals can exploit vulnerabilities in encryption algorithms to determine a user’s password from their encryption key, Unauthorized individuals can use data mining and other techniques to guess a user’s password.
Back
Unauthorized individuals can use data mining and other techniques to guess a user’s password.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
17 questions
Westward Expansion Review
Flashcard
•
9th Grade
17 questions
Physics Flashcard
Flashcard
•
9th Grade
12 questions
تمييز العدد 1
Flashcard
•
8th Grade
12 questions
Fun Brain Riddles and Teasers Flashcard
Flashcard
•
8th Grade
17 questions
T2 P24 MALU PERISAI IMAN
Flashcard
•
8th Grade
18 questions
THE MERCHANT OF VENICE ACT 1
Flashcard
•
10th Grade
18 questions
math vocabulary
Flashcard
•
8th Grade
12 questions
Data Transmission
Flashcard
•
9th Grade
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
Discover more resources for Information Technology (IT)
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
10 questions
Cell Organelles and Their Functions
Interactive video
•
6th - 10th Grade
20 questions
Graphing Inequalities on a Number Line
Quiz
•
6th - 9th Grade
20 questions
Combining Sentences
Lesson
•
9th Grade
11 questions
Adding and Subtracting Polynomials
Quiz
•
9th Grade
22 questions
El Imperfecto
Quiz
•
9th - 12th Grade
20 questions
Box and Whisker Plots
Quiz
•
9th Grade
18 questions
Exponential Growth and Decay
Quiz
•
9th Grade