
WSJ - Cybersecurity Vocab
Authored by Ray Heyob
Computers
9th - 10th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Attack Surface
A 'WarGames' style monitor at a cybercriminal command center where hackers can watch attacks in real time.
The moment when a large-scale hack or virus becomes apparent.
The sum of the different points bad actors can use to enter your systems.
A decoy hackers use to make targets think they have stopped a continuing attack.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Backdoor
The USB port on your computer that is vulnerable to malicious software.
A secret entry point established to circumvent normal security measures for access to software or a computer system.
A food-delivery service favored by hackers.
A place on the back of prototype computers that can be used for biometric breath exhalation logins, or BELs.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Bug Bounty
A type of software that can soak up a lot of bugs, quickly.
A system that is overrun by malicious software.
Reward proffered by some organizations and developers to individuals who report a vulnerability or bug.
The amount of money hackers can make from placing a bug in a computer.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Catfishing
When hackers bottom-feed, targeting the smallest, most-vulnerable companies.
When cybercriminals remotely reverse the polarity on a target company’s server.
When companies turn the tables on hackers, catching them in the act.
When a bad actor creates an online fictional persona for deceptive purposes.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Clickjacking
An attack that fools victims into clicking on a link that seems to take them to one place but instead routes them to an attacker's site.
When people repeatedly click on a link, inadvertently creating an opening for hackers.
A type of login that requires a special hand-held clicker.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Keylogger
A unique alphanumeric code that verifies authorized software access.
Software that records users’ keystrokes to collect passwords and other high-value information.
Slang for beer that coders drink at all-night coding sessions.
The grunt at software companies who has to do the most boring coding.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Multifactor Authentication (MFA) or Two-Factor Authentication (2FA)
A method of password storage where users are required to keep sensitive information in two or more hard-to-remember places.
A password-management system that more than two people have to agree on in order for it to be valid.
A security approach that asks users to give at least two credentials, such as a password and biometric, to access an organization’s data or systems.
All of the above
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?