
Introduction to Cybersecurity Final Exam Units 1-8
Flashcard
•
Computers
•
9th - 12th Grade
•
Practice Problem
•
Medium
Anthony DellaRosa
Used 1+ times
FREE Resource
Student preview

50 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Can vulnerabilities be found in technology products including operating systems, software applications, and hardware devices?
Back
True
2.
FLASHCARD QUESTION
Front
Can anyone access the Common Vulnerabilities and Exposures (CVE)?
Back
True
3.
FLASHCARD QUESTION
Front
Should you install updates?
Back
Yes
4.
FLASHCARD QUESTION
Front
The data that has been encrypted is called...
Back
Ciphertext
5.
FLASHCARD QUESTION
Front
In the CIA Triad - the "C" stands for:
Back
Confidentiality
6.
FLASHCARD QUESTION
Front
A one-way algorithm used to encrypt a password for secure storage or transfer.
Back
Hash
7.
FLASHCARD QUESTION
Front
Which of the following is a phishing attack that targets a specific individual or organization? Options: Vishing, Smishing, Spear-phishing, Wishing
Back
Spear-phishing
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?