CSP 10-7 Security Risks

CSP 10-7 Security Risks

9th - 11th Grade

8 Qs

quiz-placeholder

Similar activities

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

BTEC DIT C3 LAB - Data Level Protection 1

BTEC DIT C3 LAB - Data Level Protection 1

10th - 11th Grade

10 Qs

cyber security Y9

cyber security Y9

9th Grade

10 Qs

Security Risks

Security Risks

9th - 12th Grade

8 Qs

Part C Unit 10 Practice Exam

Part C Unit 10 Practice Exam

9th - 12th Grade

10 Qs

Unit 10 Cybersecurity CSP

Unit 10 Cybersecurity CSP

9th - 12th Grade

12 Qs

Unit 10 AP CSP Advanced

Unit 10 AP CSP Advanced

9th - 12th Grade

10 Qs

SHS_Empowerment Technologies_MELC#2_QUIZ2

SHS_Empowerment Technologies_MELC#2_QUIZ2

11th - 12th Grade

10 Qs

CSP 10-7 Security Risks

CSP 10-7 Security Risks

Assessment

Quiz

Computers

9th - 11th Grade

Medium

Created by

Linda Henneberg

Used 23+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A wireless access point that gives unauthorized access to secure networks.

Phishing

Virus

Malware

Rogue Access Point

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A program that can copy itself and gain access to a computer in an unauthorized way.

Phishing

Keylogger

Malware

Virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Freeware or shareware can be trusted to be free of all malware.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious links can show up in an email message.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Use of a program to record every keystroke made by a computer user, in order to gain fraudulent access

Keylogging

Rogue Access Point

Phishing

Malware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technique used to trick a user into providing personal information.

Keylogging

Virus

Malware

Phishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data sent over public networks can be intercepted, analyzed and modified. One way that this can happen is through...

Rogue Access Point

Keylogging

Phishing

Permissions

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unsolicited emails, attachments, and links in emails can not be used to compromise the security of a computing system.

True

False