Cybersecurity Practice
Flashcard
•
Computers
•
11th Grade
•
Hard
Wayground Content
FREE Resource
Student preview

10 questions
Show all answers
1.
FLASHCARD QUESTION
Front
A researcher wants to publish the results of a study in an open access journal. Which of the following is a direct benefit of publishing the results in this type of publication? The researcher can ensure that any personal information contained in the journal is kept private and secure. The researcher can allow the results to be easily obtained by other researchers and members of the general public.
Back
The researcher can allow the results to be easily obtained by other researchers and members of the general public.
2.
FLASHCARD QUESTION
Front
A bank customer receives an e-mail from a sender claiming to be a bank employee. The e-mail asks the customer to provide personal information and to call a phone number if he or she has any questions. The customer suspects the e-mail might be a phishing attempt. Which of the following responses is most likely to be a privacy risk for the bank customer? Calling the phone number given in the e-mail and providing the personal information over the phone
Back
Calling the phone number given in the e-mail and providing the personal information over the phone
3.
FLASHCARD QUESTION
Front
Which of the following is NOT an example of multifactor authentication?
When a user enters an incorrect password more than two times in a row, the user is locked out of the account for 24 hours.
In order to log into an account, a user must provide both a password and a fingerprint that is captured using the user’s device.
Back
When a user enters an incorrect password more than two times in a row, the user is locked out of the account for 24 hours.
4.
FLASHCARD QUESTION
Front
A user unintentionally installs keylogging software on a computer. How can the keylogging software be used by an unauthorized individual to gain access to computing resources?
Back
The software records all user input on the computer. The recorded information is transmitted to an unauthorized individual, who analyzes it to determine the user’s login passwords.
5.
FLASHCARD QUESTION
Front
An individual receives an e-mail that appears to be from an insurance company. The message offers a low insurance rate, and prompts the recipient to click a link to learn more. Which of the following is most indicative that the e-mail is part of a phishing attempt? Options: After clicking the link, software is installed on the recipient’s computer that records every keystroke made on the computer. After clicking the link, a Web page opens that prompts the recipient for personal information.
Back
After clicking the link, a Web page opens that prompts the recipient for personal information.
6.
FLASHCARD QUESTION
Front
Which of the following best exemplifies the use of keylogging to gain unauthorized access to a computer system? A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user’s computer using the recorded data.
Back
A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user’s computer using the recorded data.
7.
FLASHCARD QUESTION
Front
Which of the following best exemplifies the use of multifactor authentication to protect an online banking system? After entering a password for an online bank account, a user must also enter a code that is sent to the user’s phone via text message.
Back
After entering a password for an online bank account, a user must also enter a code that is sent to the user’s phone via text message.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
1 questions
QUIM_3_EM_Q005
Flashcard
•
12th Grade
6 questions
Lesson 8
Flashcard
•
11th Grade
8 questions
Uji Pemahaman Hukum Newton
Flashcard
•
11th Grade
8 questions
Accounting Concepts
Flashcard
•
11th Grade
8 questions
MATHEMATICS 10 - Graph of Polynomial Functions PART 1
Flashcard
•
10th Grade
11 questions
SAINS SUKAN TINGKATAN 5 BIDANG 7
Flashcard
•
KG
9 questions
Fluxo de Matéria e Energia
Flashcard
•
10th Grade
10 questions
stats vocab 5.1 - 5.2
Flashcard
•
12th Grade
Popular Resources on Wayground
20 questions
Halloween Trivia
Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Order of Operations
Quiz
•
5th Grade
20 questions
Halloween
Quiz
•
5th Grade
16 questions
Halloween
Quiz
•
3rd Grade
12 questions
It's The Great Pumpkin Charlie Brown
Quiz
•
1st - 5th Grade
20 questions
Possessive Nouns
Quiz
•
5th Grade
10 questions
Halloween Traditions and Origins
Interactive video
•
5th - 10th Grade
Discover more resources for Computers
20 questions
Halloween movies trivia
Quiz
•
7th - 12th Grade
15 questions
Halloween Characters
Quiz
•
7th - 12th Grade
10 questions
Halloween Movies Trivia
Quiz
•
5th Grade - University
14 questions
Halloween Fun
Quiz
•
2nd - 12th Grade
28 questions
Ser vs estar
Quiz
•
9th - 12th Grade
21 questions
Halloween & Math
Quiz
•
8th - 12th Grade
13 questions
Halloween Movie Trivia
Quiz
•
9th - 12th Grade
7 questions
Halloween - Myths & Legends
Interactive video
•
10th - 12th Grade