Cyber Mid-Term Review 2019

Cyber Mid-Term Review 2019

9th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

LE VERBE

LE VERBE

4th - 11th Grade

20 Qs

Evaluación Primer Periodo Excel

Evaluación Primer Periodo Excel

10th Grade

20 Qs

TO UTBK B.Indonesia (Miss Annisa)

TO UTBK B.Indonesia (Miss Annisa)

12th Grade

20 Qs

FINAL TASK

FINAL TASK

1st - 12th Grade

20 Qs

KIỂM TRA 15' ANH 9/5

KIỂM TRA 15' ANH 9/5

9th Grade

20 Qs

KUIZ GURU MINGGU PAIBAT

KUIZ GURU MINGGU PAIBAT

10th Grade

20 Qs

unit 4

unit 4

9th Grade

20 Qs

PROPIEDADES DE LOS POLIGONOS

PROPIEDADES DE LOS POLIGONOS

10th Grade

20 Qs

Cyber Mid-Term Review 2019

Cyber Mid-Term Review 2019

Assessment

Quiz

9th - 12th Grade

Practice Problem

Hard

Created by

Walisa Sabb

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does The Onion Network provide anonymity for users?

It uses encryption.

It routes data packets through many computers before reaching their destinations.

It masks the IP address used in the packets that are being sent

It creates a private address for sending and receiving data.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker that uses premade tools is called a ___________.

baby

script kiddie

renegade

coder

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ is the avenue or path a hacker uses to commit attacks.

Phreaking

Attack vector

Social engineering attack

Black hat email

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Manipulating people to obtain information to hack computer systems is called _______________________.

Malware

Dumpster diving

Social engineering

Phreaking

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these areas is not considered one of the five areas of Information Assurance?

Availability

Confidentiality

Accessibility

Authentication

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

High-value hacking targets often include ________.

retail websites

electrical grids

sites on the darknet

small business owners

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following helps provide confidentiality to data?

Encryption

Nonrepudiation

Antimalware

A secure password

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?