
Cyber 1 Module 1 Review
Authored by Angelina CTA]
Computers
10th Grade
Used 14+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
38 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Performing shoulder surfing in order to check someone's password is ____________ ethical practice.
a good
not so good
a very good social engineering
a bad
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
___________ has now evolved to be one of the most popular ways to perform unethical hacking.
Automated apps
Database software
Malware
Worms
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which example illustrates how malware might be concealed?
An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware.
An attack is launched against the public website of an online retailer with the objective of blocking its response to visitors.
A hacker uses techniques to improve the ranking of a website so that users are redirected to a malicious site.
A botnet of zombies carry personal information back to the hacker.
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following are good cyber hygiene practices (check all that apply)
Keep sensitive information in secure places
Make sure a trustworthy person knows your password in case you forget it
Lock your computer when in public areas
Do not let strangers use your computer
Do not use public wifi
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A __________ is the method by which an attacker can use to take advantage of a bug or weakness in a network or system to cause harm
Threat
Exploit
Vulnerbility
Risk
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of attack requires an attacker to use a brute force approach?
denial of service
password cracking
social engineering
packet sniffing
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Preventing the target servers from being able to handle additional requests is the primary goal of _______________ attack.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
36 questions
Chapter Nine Elements of art and Design Hierarchy
Quiz
•
9th - 12th Grade
40 questions
year 3 QUIZ 3 2nd term
Quiz
•
3rd Grade - University
33 questions
grade 5- modelling exel- review ICT
Quiz
•
3rd - 10th Grade
35 questions
Photoshop ACA
Quiz
•
9th - 12th Grade
35 questions
Networks GCSE AQA 2018
Quiz
•
10th - 11th Grade
35 questions
98-367 PT3
Quiz
•
9th - 12th Grade
37 questions
Excel Gmetrix Quiz
Quiz
•
10th - 12th Grade
36 questions
EarSketch/Python Programming
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade