WSJ - Cybersecurity Vocab

WSJ - Cybersecurity Vocab

9th - 10th Grade

15 Qs

quiz-placeholder

Similar activities

Kuis Pengayaan (Aplikasi Sehari-hari?

Kuis Pengayaan (Aplikasi Sehari-hari?

9th Grade

10 Qs

Scratch

Scratch

KG - Professional Development

10 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

Latihan PSAS Kelas 9

Latihan PSAS Kelas 9

9th Grade - University

20 Qs

12AIT - All About W3C <3

12AIT - All About W3C <3

10th Grade - University

18 Qs

la internet

la internet

3rd - 11th Grade

20 Qs

Alapismeretek

Alapismeretek

7th - 12th Grade

10 Qs

WJEC GCSE ICT Unit 1 E-Mail

WJEC GCSE ICT Unit 1 E-Mail

9th - 10th Grade

13 Qs

WSJ - Cybersecurity Vocab

WSJ - Cybersecurity Vocab

Assessment

Quiz

Computers

9th - 10th Grade

Hard

Created by

Ray Heyob

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attack Surface

A 'WarGames' style monitor at a cybercriminal command center where hackers can watch attacks in real time.

The moment when a large-scale hack or virus becomes apparent.

The sum of the different points bad actors can use to enter your systems.

A decoy hackers use to make targets think they have stopped a continuing attack.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Backdoor

The USB port on your computer that is vulnerable to malicious software.

A secret entry point established to circumvent normal security measures for access to software or a computer system.

A food-delivery service favored by hackers.

A place on the back of prototype computers that can be used for biometric breath exhalation logins, or BELs.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bug Bounty

A type of software that can soak up a lot of bugs, quickly.

A system that is overrun by malicious software.

Reward proffered by some organizations and developers to individuals who report a vulnerability or bug.

The amount of money hackers can make from placing a bug in a computer.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Catfishing

When hackers bottom-feed, targeting the smallest, most-vulnerable companies.

When cybercriminals remotely reverse the polarity on a target company’s server.

When companies turn the tables on hackers, catching them in the act.

When a bad actor creates an online fictional persona for deceptive purposes.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clickjacking

An attack that fools victims into clicking on a link that seems to take them to one place but instead routes them to an attacker's site.

When people repeatedly click on a link, inadvertently creating an opening for hackers.

A type of login that requires a special hand-held clicker.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Keylogger

A unique alphanumeric code that verifies authorized software access.

Software that records users’ keystrokes to collect passwords and other high-value information.

Slang for beer that coders drink at all-night coding sessions.

The grunt at software companies who has to do the most boring coding.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Multifactor Authentication (MFA) or Two-Factor Authentication (2FA)

A method of password storage where users are required to keep sensitive information in two or more hard-to-remember places.

A password-management system that more than two people have to agree on in order for it to be valid.

A security approach that asks users to give at least two credentials, such as a password and biometric, to access an organization’s data or systems.

All of the above

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?