CIW-Lesson 8 Review (1.10)

CIW-Lesson 8 Review (1.10)

9th - 12th Grade

38 Qs

quiz-placeholder

Similar activities

AP CSP Review Code.org Cybersecurity

AP CSP Review Code.org Cybersecurity

9th - 12th Grade

33 Qs

J277 1.5 System Software

J277 1.5 System Software

9th Grade

34 Qs

Chapter 2 - Data Transmission (IGCSE Computer Science)

Chapter 2 - Data Transmission (IGCSE Computer Science)

9th Grade

40 Qs

Chapter 5 - Online Protection

Chapter 5 - Online Protection

9th - 12th Grade

34 Qs

Final Revision G12_2T

Final Revision G12_2T

12th Grade

37 Qs

AP CSP Unit 8 Cyber Security and Global Impacts

AP CSP Unit 8 Cyber Security and Global Impacts

9th - 12th Grade

33 Qs

CSP Unit 10 Cybersecurity

CSP Unit 10 Cybersecurity

9th - 12th Grade

33 Qs

AP Computer Science Principles Cyber Security

AP Computer Science Principles Cyber Security

9th - 12th Grade

33 Qs

CIW-Lesson 8 Review (1.10)

CIW-Lesson 8 Review (1.10)

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Used 53+ times

FREE Resource

38 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the most common method for spreading viruses?
Downloading files
Installing programs
Swapping disks or drives
Opening attachments

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement best describes hash encryption?
An encryption method in which a key is required to encrypt data for storage and verify its integrity
An encryption method in which the same key is used to encrypt and decrypt a message
An encryption method in which two separate keys -- a private key and a public key -- are used to encrypt and decrypt a message
An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Secure authentication requires:
a user name, a password, and encryption of this information
either a user name or a password.
a user name and a password.
a user name only.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When your company's private LAN is protected by a firewall, which of the following is true?
Neither outside users nor users on the LAN can access information from the Internet.
Users on the LAN can access information from the Internet, but outside users cannot access information stored on the LAN.
Users on the LAN cannot access information from the Internet, but outside users can access information stored on the LAN.
Neither outside users nor users on the LAN can access information stored on the LAN.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can you use to electronically verify your identity without the need to provide data confidentiality?
Digital signature
Digital certificate
Firewall
Encrypted key

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an effective way for Web site owners to prevent typosquatting?
Purchase domain names that are similar to their actual domain names
Encrypt all network transmissions with algorithms that use a minimum of 128-bit keys
Automatically apply operating system updates and patches as they become available
Host their Web sites on illicit servers

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You suspect that an attacker has gained control of your computer system. What action should you take next?
Shut down the computer.
Unplug the computer network cable and/or disable the computer's wireless NIC.
Run anti-virus software on all disks associated with this system.
Enable strong encryption on all files on the hard disk.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?