
Cyber Mid-Term Review 2019
Authored by Walisa Sabb
9th - 12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does The Onion Network provide anonymity for users?
It uses encryption.
It routes data packets through many computers before reaching their destinations.
It masks the IP address used in the packets that are being sent
It creates a private address for sending and receiving data.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hacker that uses premade tools is called a ___________.
baby
script kiddie
renegade
coder
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
__________ is the avenue or path a hacker uses to commit attacks.
Phreaking
Attack vector
Social engineering attack
Black hat email
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Manipulating people to obtain information to hack computer systems is called _______________________.
Malware
Dumpster diving
Social engineering
Phreaking
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these areas is not considered one of the five areas of Information Assurance?
Availability
Confidentiality
Accessibility
Authentication
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
High-value hacking targets often include ________.
retail websites
electrical grids
sites on the darknet
small business owners
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following helps provide confidentiality to data?
Encryption
Nonrepudiation
Antimalware
A secure password
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?