Cyber 1 Module 1 Review

Cyber 1 Module 1 Review

10th Grade

38 Qs

quiz-placeholder

Similar activities

Sumatif 1 - Bab Sistem Komputer

Sumatif 1 - Bab Sistem Komputer

10th Grade

33 Qs

FIRST PE in TLE_ICT-CSS10_2024-2025

FIRST PE in TLE_ICT-CSS10_2024-2025

10th Grade

42 Qs

Photoshop Terms and Controls

Photoshop Terms and Controls

9th Grade - University

38 Qs

SAS GENAP INFORMATIKA (  Susulan )

SAS GENAP INFORMATIKA ( Susulan )

10th Grade

40 Qs

Nat 5 Computer Systems Revision

Nat 5 Computer Systems Revision

9th - 10th Grade

36 Qs

TIK kelas 7, Penilaian Tengah semester

TIK kelas 7, Penilaian Tengah semester

7th Grade - University

40 Qs

he

he

8th - 10th Grade

38 Qs

 Asesmen Sumatif Akhir tahun (ASAS) Informatika Kelas X

Asesmen Sumatif Akhir tahun (ASAS) Informatika Kelas X

10th Grade

40 Qs

Cyber 1 Module 1 Review

Cyber 1 Module 1 Review

Assessment

Quiz

Computers

10th Grade

Practice Problem

Medium

Created by

Angelina CTA]

Used 14+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

38 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Performing shoulder surfing in order to check someone's password is ____________ ethical practice.

a good

not so good

a very good social engineering

a bad

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___________ has now evolved to be one of the most popular ways to perform unethical hacking.

Automated apps

Database software

Malware

Worms

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which example illustrates how malware might be concealed?

An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware.

An attack is launched against the public website of an online retailer with the objective of blocking its response to visitors.

A hacker uses techniques to improve the ranking of a website so that users are redirected to a malicious site.

A botnet of zombies carry personal information back to the hacker.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are good cyber hygiene practices (check all that apply)

Keep sensitive information in secure places

Make sure a trustworthy person knows your password in case you forget it

Lock your computer when in public areas

Do not let strangers use your computer

Do not use public wifi

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A __________ is the method by which an attacker can use to take advantage of a bug or weakness in a network or system to cause harm

Threat

Exploit

Vulnerbility

Risk

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack requires an attacker to use a brute force approach?

denial of service

password cracking

social engineering

packet sniffing

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Preventing the target servers from being able to handle additional requests is the primary goal of _______________ attack.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?