Cybersecurity 2.2.1 - 2.2.3

Cybersecurity 2.2.1 - 2.2.3

10th - 12th Grade

19 Qs

quiz-placeholder

Similar activities

4. razred TŠRB - DIOIS - Dijagnostika Win2019 kao FTP servera

4. razred TŠRB - DIOIS - Dijagnostika Win2019 kao FTP servera

12th Grade

21 Qs

Google Suite Skills

Google Suite Skills

1st - 10th Grade

20 Qs

File Management

File Management

7th - 10th Grade

23 Qs

Google Apps

Google Apps

6th - 12th Grade

16 Qs

Mail Merge

Mail Merge

10th - 11th Grade

20 Qs

FILE MANAGEMENT

FILE MANAGEMENT

KG - University

15 Qs

Getting Started with MS Office

Getting Started with MS Office

7th - 12th Grade

19 Qs

Malware

Malware

9th - 11th Grade

15 Qs

Cybersecurity 2.2.1 - 2.2.3

Cybersecurity 2.2.1 - 2.2.3

Assessment

Quiz

Computers

10th - 12th Grade

Medium

Created by

Beverly Ross

Used 26+ times

FREE Resource

19 questions

Show all answers

1.

MATCH QUESTION

1 min • 10 pts

Try to match each type of malware with the correct scenario

Programming Error

While checking a monitor cable, a user notices a strange-looking USB device plugged into the back of their compture

Man-in-the-middle

A software program was not reviewd by a peer nor checked by a quality assurance team before it's release to the public

Botnet/DDos

Access to system devices, such as printers and network switches, fails frequently. To solve the problem, the comuters operating system must be rebuilt.

Rootkit

A user's computer boots, but when they try to access their data, it appears garbled and is unreadable.

Ransomware

A vistor to a website notices a delay in exchanging data with the site and the lock symbol in the address bar looks strange

2.

DRAW QUESTION

3 mins • 10 pts

Diagram what happens in an On-Path Attack

Media Image

3.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

An ethical cyber expert can expect the following aspects to their career except for

Many rewarding career opportunities

May never get hired anywhere

Lifetime earning

Can provide reliable, stable lifestyle

4.

MATCH QUESTION

1 min • 10 pts

Match the following name of the motivation of a hacker with the correct description

Social Ideology

Companies steal information from competitors to elimate the competition.

Prevention

Hackers engage in "hactivism" to change aspects of society

Whistleblower

Criminals steal money from individuals & corporations

Financial Gain

An "insider" exposes injustice that the organization is committing.

Industrial Espionage

With permission from the system owner, authorized hackers find the weaknesses of a system and report their findings.

5.

OPEN ENDED QUESTION

3 mins • 5 pts

What is the difference between Hardware Keyloggers and Software keyloggers

Evaluate responses using AI:

OFF

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is latency?

a delay in the transfer of data

an encryption code

a type of crypto-currency

a type of malware

7.

REORDER QUESTION

1 min • 10 pts

Reorder the following steps for using FileZilla

Select files to copy under Local Site

Enter IP address of remote machine in Host Field

Enter username & Password

On remote site, find file(s) to copy

Right-click file & choose "Upload"

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?