Search Header Logo

Cybersecurity 2 Chapter 1 Quiz

Authored by EDWARD WARBURTON

Computers

9th - 12th Grade

Used 8+ times

Cybersecurity 2 Chapter 1 Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Circumventing or breaking past security boundaries

Cybersecurity
Hacking
Attack vector
Bounty

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an early form of hacking that involved breaking into a phone system?

white-hat hacking
attack surface
cybersecurity
phreaking

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How is anonymity achieved on the dark net?

dumpster diving
phreaking
onion network
deep web

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What best describes information assurance?

protecting data in all its forms
preventing virus infections
black-hat hacking
social engineering

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Black-hat hackers may be motivated by all of the following except:

challenge and thrills
revenge
protecting systems
criminal intent

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a bug-bounty program work?

proves certain skills in an area of cybersecurity
provides rewards for flaws and vulnerabilities found in software
prevents viruses and other malware from entering a system
creates a barrier between an internal network and the Internet

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a simulation of an operating system running on a physical computer?

virtual machine
pseudo OS
firewalled system
intranet

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?