Cybersecurity 2 Chapter 1 Quiz

Cybersecurity 2 Chapter 1 Quiz

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Quiz on Intro to Linux

Quiz on Intro to Linux

12th Grade - University

15 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Network Chuck IT Job Quiz

Network Chuck IT Job Quiz

12th Grade

10 Qs

Cyber safty

Cyber safty

9th Grade

10 Qs

Cybersecurity Certification

Cybersecurity Certification

7th - 9th Grade

6 Qs

Cybersecurity Basics

Cybersecurity Basics

7th - 9th Grade

6 Qs

Computing for College and Careers Semester Test

Computing for College and Careers Semester Test

9th - 12th Grade

15 Qs

Post test sistem komunikasi informatika

Post test sistem komunikasi informatika

10th Grade

7 Qs

Cybersecurity 2 Chapter 1 Quiz

Cybersecurity 2 Chapter 1 Quiz

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

EDWARD WARBURTON

Used 8+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Circumventing or breaking past security boundaries
Cybersecurity
Hacking
Attack vector
Bounty

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an early form of hacking that involved breaking into a phone system?
white-hat hacking
attack surface
cybersecurity
phreaking

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How is anonymity achieved on the dark net?
dumpster diving
phreaking
onion network
deep web

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What best describes information assurance?
protecting data in all its forms
preventing virus infections
black-hat hacking
social engineering

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Black-hat hackers may be motivated by all of the following except:
challenge and thrills
revenge
protecting systems
criminal intent

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a bug-bounty program work?
proves certain skills in an area of cybersecurity
provides rewards for flaws and vulnerabilities found in software
prevents viruses and other malware from entering a system
creates a barrier between an internal network and the Internet

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a simulation of an operating system running on a physical computer?
virtual machine
pseudo OS
firewalled system
intranet

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?