Cybersecurity Flashcard

Cybersecurity Flashcard

Assessment

Flashcard

Computers

12th Grade

Practice Problem

Hard

Created by

Wayground Content

FREE Resource

Student preview

quiz-placeholder

80 questions

Show all answers

1.

FLASHCARD QUESTION

Front

The fraudulent practice of sending emails claiming to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, is also known as ____.

Back

phishing

2.

FLASHCARD QUESTION

Front

When thieves steal your personal information to take over or open new accounts, file fake tax returns, rent or buy properties, or do other criminal things in your name, you have been a victim of identity ____.

Back

theft

3.

FLASHCARD QUESTION

Front

Denial of access or of misusing websites or computer networks is known as _____?

Back

hacking

4.

FLASHCARD QUESTION

Front

A type of malicious software that threatens to publish the victim's information or block access to it unless a fee is paid is called ____.

Back

ransomware

5.

FLASHCARD QUESTION

Front

After an intrusion has occurred and the intruder has been removed from the system, the next step is to ____.

Back

recover and restore functionality

6.

FLASHCARD QUESTION

Front

An important aspect of evidence gathering is _____?

Back

backing up all log files

7.

FLASHCARD QUESTION

Front

The network administrator has recently discovered information on a computer drive that might indicate evidence of illegal activity. To perform forensic activities on the disk to see what kind of information it contains, the first step is to _____?

Back

make a bit-level copy of the disk

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?