CSP Unit 10 Pre-Assessment - Cybersecurity

CSP Unit 10 Pre-Assessment - Cybersecurity

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

CSP 2.1.5 Secure Protocols

CSP 2.1.5 Secure Protocols

10th - 12th Grade

12 Qs

CSP I - Unit 8 Vocabulary

CSP I - Unit 8 Vocabulary

9th Grade

13 Qs

AP Computer Science Unit 10

AP Computer Science Unit 10

9th - 12th Grade

12 Qs

ENCRYPTION AND CYBERCRIME

ENCRYPTION AND CYBERCRIME

7th - 10th Grade

15 Qs

Encryption

Encryption

9th - 11th Grade

10 Qs

Security Risks & Precautions

Security Risks & Precautions

10th - 12th Grade

8 Qs

Unit 4 Big Data

Unit 4 Big Data

10th - 12th Grade

11 Qs

CSP 10-7 Security Risks

CSP 10-7 Security Risks

9th - 11th Grade

8 Qs

CSP Unit 10 Pre-Assessment - Cybersecurity

CSP Unit 10 Pre-Assessment - Cybersecurity

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Erin Pennington

Used 89+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).

Keylogging

Computing Innovation

Encryption

Phishing

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Information about an individual that identifies, links, relates, or describes them.

phishing

keylogging

personally identifiable information (PII)

malware

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.

phishing

keylogging

malware

rogue access point

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.

rogue access point

phishing

malware

keylogging

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Software intended to damage a computing system or to take partial control over its operation.

phishing

keylogging

malware

rogue access point

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A wireless access point that gives unauthorized access to secure networks.

rogue access point

malware

phishing

keylogging

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A process of encoding messages to keep them secret, so only "authorized" parties can read them.

decryption

encryption

symmetric key encryption

asymmetric key encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?