Cybersecurity Practice

Cybersecurity Practice

Assessment

Flashcard

Computers

11th Grade

Hard

Created by

Quizizz Content

FREE Resource

Student preview

quiz-placeholder

10 questions

Show all answers

1.

FLASHCARD QUESTION

Front

A researcher wants to publish the results of a study in an open access journal. Which of the following is a direct benefit of publishing the results in this type of publication? The researcher can ensure that any personal information contained in the journal is kept private and secure. The researcher can allow the results to be easily obtained by other researchers and members of the general public.

Back

The researcher can allow the results to be easily obtained by other researchers and members of the general public.

2.

FLASHCARD QUESTION

Front

A bank customer receives an e-mail from a sender claiming to be a bank employee. The e-mail asks the customer to provide personal information and to call a phone number if he or she has any questions. The customer suspects the e-mail might be a phishing attempt. Which of the following responses is most likely to be a privacy risk for the bank customer? Calling the phone number given in the e-mail and providing the personal information over the phone

Back

Calling the phone number given in the e-mail and providing the personal information over the phone

3.

FLASHCARD QUESTION

Front

Which of the following is NOT an example of multifactor authentication?
When a user enters an incorrect password more than two times in a row, the user is locked out of the account for 24 hours.
In order to log into an account, a user must provide both a password and a fingerprint that is captured using the user’s device.

Back

When a user enters an incorrect password more than two times in a row, the user is locked out of the account for 24 hours.

4.

FLASHCARD QUESTION

Front

A user unintentionally installs keylogging software on a computer. How can the keylogging software be used by an unauthorized individual to gain access to computing resources?

Back

The software records all user input on the computer. The recorded information is transmitted to an unauthorized individual, who analyzes it to determine the user’s login passwords.

5.

FLASHCARD QUESTION

Front

An individual receives an e-mail that appears to be from an insurance company. The message offers a low insurance rate, and prompts the recipient to click a link to learn more. Which of the following is most indicative that the e-mail is part of a phishing attempt? Options: After clicking the link, software is installed on the recipient’s computer that records every keystroke made on the computer. After clicking the link, a Web page opens that prompts the recipient for personal information.

Back

After clicking the link, a Web page opens that prompts the recipient for personal information.

6.

FLASHCARD QUESTION

Front

Which of the following best exemplifies the use of keylogging to gain unauthorized access to a computer system? A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user’s computer using the recorded data.

Back

A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user’s computer using the recorded data.

7.

FLASHCARD QUESTION

Front

Which of the following best exemplifies the use of multifactor authentication to protect an online banking system? After entering a password for an online bank account, a user must also enter a code that is sent to the user’s phone via text message.

Back

After entering a password for an online bank account, a user must also enter a code that is sent to the user’s phone via text message.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?