
Cyber 1 Module 1 Review
Authored by Angelina CTA]
Computers
10th Grade
Used 14+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
38 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Performing shoulder surfing in order to check someone's password is ____________ ethical practice.
a good
not so good
a very good social engineering
a bad
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
___________ has now evolved to be one of the most popular ways to perform unethical hacking.
Automated apps
Database software
Malware
Worms
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which example illustrates how malware might be concealed?
An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware.
An attack is launched against the public website of an online retailer with the objective of blocking its response to visitors.
A hacker uses techniques to improve the ranking of a website so that users are redirected to a malicious site.
A botnet of zombies carry personal information back to the hacker.
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following are good cyber hygiene practices (check all that apply)
Keep sensitive information in secure places
Make sure a trustworthy person knows your password in case you forget it
Lock your computer when in public areas
Do not let strangers use your computer
Do not use public wifi
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A __________ is the method by which an attacker can use to take advantage of a bug or weakness in a network or system to cause harm
Threat
Exploit
Vulnerbility
Risk
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of attack requires an attacker to use a brute force approach?
denial of service
password cracking
social engineering
packet sniffing
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Preventing the target servers from being able to handle additional requests is the primary goal of _______________ attack.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
40 questions
TIN 8 ON TAP GIUA KY 2
Quiz
•
8th Grade - University
34 questions
Multimedia Webpage Design 1.01
Quiz
•
9th - 12th Grade
40 questions
OCR GCSE CS MCQs 1.1 Systems Architecture (J276)
Quiz
•
9th - 10th Grade
33 questions
1.2 Secondary Storage
Quiz
•
9th - 11th Grade
35 questions
CompTIA ITF+ Test 2-2
Quiz
•
10th - 12th Grade
37 questions
CSS and HTML Vocabulary
Quiz
•
9th - 12th Grade
38 questions
Input Output devices - a lesson
Quiz
•
1st Grade - University
40 questions
C++ Programming
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade