Cyber - Unit 2 Review

Cyber - Unit 2 Review

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

GCSE AQA CS - 06 Cyber Security

GCSE AQA CS - 06 Cyber Security

10th - 11th Grade

18 Qs

POCS-Ch. 2 Review (Comprehension)

POCS-Ch. 2 Review (Comprehension)

7th - 12th Grade

20 Qs

Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

Cybersecurity Security MTA

Cybersecurity Security MTA

9th - 12th Grade

20 Qs

Cybersecurity Essentials Chapter 2 Review

Cybersecurity Essentials Chapter 2 Review

9th Grade - University

20 Qs

Cybersecurity

Cybersecurity

11th - 12th Grade

20 Qs

Cyber Security Certification Test

Cyber Security Certification Test

11th - 12th Grade

20 Qs

 Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

Cyber - Unit 2 Review

Cyber - Unit 2 Review

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Donna Woods

Used 18+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A guessed password affects which basic principle of a company's security?

Confidentiality

Safety

Availability

Integrity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Windows 7 machine used by the receptionist did not get the latest security patches, and a known vulnerability was exploited. Which business security domain should have addressed the issue?

WAN

Server

Workstation

LAN

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following presents a vulnerability to the network?

An unpatched computer.

A computer infected with a root kit.

Files are not protected with a password.

The sales manager's use of a weak password.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The data on a server is encrypted form a _______ threat. This affects the ______ principle.

Ransomware; availability

Ransomware; confidentiality

Worm; availability

root kit; integrity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of malware spreads through an open network port.

Trojan Horse

Worm

Root Kit

Polymorphic

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which situation leaves you most vulnerable to malware infections?

Installing purchased software from a DVD.

Surfing the Internet on mobile devices.

Using a flash drive on multiple machines.

Exchanging messages through a social media app.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bug-bounty programs are especially useful against which of the following?

Ransomware attacks

Zero-day vulnerabilities

Keyloggers

Malicious cookies

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?