Foundations & Threats (C1)

Foundations & Threats (C1)

9th - 12th Grade

18 Qs

quiz-placeholder

Similar activities

GCSE AQA CS - 06 Cyber Security

GCSE AQA CS - 06 Cyber Security

10th - 11th Grade

18 Qs

Network Security

Network Security

9th Grade

13 Qs

Cyber 3 Unit 3 Review Game

Cyber 3 Unit 3 Review Game

11th - 12th Grade

20 Qs

Cyber Security

Cyber Security

8th - 12th Grade

20 Qs

Cyber - Unit 2 Review

Cyber - Unit 2 Review

9th - 12th Grade

20 Qs

Understanding the Threat to Digital Systems

Understanding the Threat to Digital Systems

10th Grade

20 Qs

PLTW Cybersecurity

PLTW Cybersecurity

9th - 12th Grade

20 Qs

Unit 7 Quiz Review

Unit 7 Quiz Review

9th - 12th Grade

20 Qs

Foundations & Threats (C1)

Foundations & Threats (C1)

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Melody Kelley

Used 53+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Combining different forms of authentication to authenticate a user is called multi-factor authentication.

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Biometrics is an authentication method using measurement and analysis of a biological feature.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Name for a secret or unknown access point of entry into a system.

Payload

Backdoor

Secure Cookie

Zero Day Vulnerability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Name for the actions of malicious code.

Payload

Backdoor

Secure Cookie

Zero Day Vulnerability

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A flaw that exists in software when it is released and remains hidden until exploited by hackers.

Cookie

Zero Day Vulnerability

Keylogger

Trojan Horse

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

A technology that tracks a user’s keystrokes on the keyboard.

Cookie

Zero Day Vulnerability

Keylogger

Trojan Horse

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Name for a type a virus that changes its characteristics to avoid detection.

Changling Worm

Trojan Horse

Logic Bomb

Polymorphic Virus

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?