
Cybersecurity 2 Chapter 1 Quiz
Authored by EDWARD WARBURTON
Computers
9th - 12th Grade
Used 8+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Circumventing or breaking past security boundaries
Cybersecurity
Hacking
Attack vector
Bounty
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an early form of hacking that involved breaking into a phone system?
white-hat hacking
attack surface
cybersecurity
phreaking
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How is anonymity achieved on the dark net?
dumpster diving
phreaking
onion network
deep web
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What best describes information assurance?
protecting data in all its forms
preventing virus infections
black-hat hacking
social engineering
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Black-hat hackers may be motivated by all of the following except:
challenge and thrills
revenge
protecting systems
criminal intent
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does a bug-bounty program work?
proves certain skills in an area of cybersecurity
provides rewards for flaws and vulnerabilities found in software
prevents viruses and other malware from entering a system
creates a barrier between an internal network and the Internet
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a simulation of an operating system running on a physical computer?
virtual machine
pseudo OS
firewalled system
intranet
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?