Cybersecurity - Assessment Review - SGM #2

Cybersecurity - Assessment Review - SGM #2

Assessment

Flashcard

Information Technology (IT)

9th Grade

Hard

Created by

Quizizz Content

FREE Resource

Student preview

quiz-placeholder

19 questions

Show all answers

1.

FLASHCARD QUESTION

Front

Which of the following would pose the greatest threat to a user's personal privacy if it were to be leaked to the public? The IP address of the user’s computer, The user's browser cookies, The user's email address, The user's public key for encryption

Back

The user's public key for encryption

2.

FLASHCARD QUESTION

Front

In the context of password generation, for what does the acronym OTP stand?

Back

One-time password

3.

FLASHCARD QUESTION

Front

In 2017, the credit report company Equifax suffered a data breach that exposed the PII of more than 100 million Americans to attackers. The exposed data included names, home addresses, phone numbers, dates of birth, Social Security numbers, and driver's licence numbers. With access to only that information, which of these actions could not be taken by an attacker? An attacker could sell the Social Security numbers to another attacker on the Internet; An attacker could send an email to an affected person that contained their PII and a threat to reveal them; An attacker could post the home addresses on a public website; An attacker could steal the identity of one of the affected people.

Back

An attacker could send an email to an affected person that contained their PII and a threat to reveal them.

4.

FLASHCARD QUESTION

Front

Which of the following could not occur if your computer is connected to the Internet over a rogue access point?
- The rogue access point could analyze the types of websites you visit
- The rogue access point could modify the contents of your connection to a website
- The rogue access point could see what keywords you're searching for on a web search engine
- The rogue access point could read the files on your device

Back

The rogue access point could read the files on your device

5.

FLASHCARD QUESTION

Front

Why is a computer virus more dangerous than other types of malware?

Back

A virus can make copies of itself, including copying itself into an existing file.

6.

FLASHCARD QUESTION

Front

Dorothy is a network administrator. Her system has been experimenting with an attack that is using bots to send fake requests to the cloud resources her company uses. This is causing disruption of the availabilities of these resources. How is this attack best described?

Back

DDoS

7.

FLASHCARD QUESTION

Front

Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are used? Unauthorized individuals can deny service to a computing system by overwhelming the system with login attempts, Unauthorized individuals can exploit vulnerabilities in compression algorithms to determine a user’s password from their decompressed data, Unauthorized individuals can exploit vulnerabilities in encryption algorithms to determine a user’s password from their encryption key, Unauthorized individuals can use data mining and other techniques to guess a user’s password.

Back

Unauthorized individuals can use data mining and other techniques to guess a user’s password.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?