Cybersecurity

Cybersecurity

9th - 12th Grade

32 Qs

quiz-placeholder

Similar activities

0721 MANDARIN 1 TEST 1

0721 MANDARIN 1 TEST 1

KG - Professional Development

30 Qs

The Globalizacion

The Globalizacion

12th Grade

28 Qs

use your brain

use your brain

KG - Professional Development

28 Qs

UTRJEVANJE ZNANJA - UZS

UTRJEVANJE ZNANJA - UZS

10th Grade

28 Qs

Greece Legacy

Greece Legacy

10th Grade

34 Qs

SFU 2021 BAHASA INGGRIS KELAS XII

SFU 2021 BAHASA INGGRIS KELAS XII

12th Grade

30 Qs

Simple Past

Simple Past

12th Grade

28 Qs

Logos

Logos

1st - 12th Grade

28 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

Education

9th - 12th Grade

Hard

Created by

Joan Lim

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

32 questions

Show all answers

1.

MATCH QUESTION

30 sec • 10 pts

Try to match each type of malware with the correct scenario

Man-in-the-middle

A vistor to a website notices a delay in exchanging data with the site and the lock symbol in the address bar looks strange

Rootkit

Access to system devices, such as printers and network switches, fails frequently. To solve the problem, the comuters operating system must be rebuilt.

Programming Error

A software program was not reviewd by a peer nor checked by a quality assurance team before it's release to the public

Botnet/DDos

While checking a monitor cable, a user notices a strange-looking USB device plugged into the back of their compture

Ransomware

A user's computer boots, but when they try to access their data, it appears garbled and is unreadable.

2.

DRAW QUESTION

30 sec • 10 pts

Diagram what happens in an On-Path Attack

Media Image

3.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

An ethical cyber expert can expect the following aspects to their career except for

Many rewarding career opportunities

May never get hired anywhere

Lifetime earning

Can provide reliable, stable lifestyle

4.

MATCH QUESTION

30 sec • 10 pts

Match the following name of the motivation of a hacker with the correct description

Financial Gain

Criminals steal money from individuals & corporations

Social Ideology

With permission from the system owner, authorized hackers find the weaknesses of a system and report their findings.

Industrial Espionage

An "insider" exposes injustice that the organization is committing.

Whistleblower

Companies steal information from competitors to elimate the competition.

Prevention

Hackers engage in "hactivism" to change aspects of society

5.

OPEN ENDED QUESTION

30 sec • 5 pts

What is the difference between Hardware Keyloggers and Software keyloggers

Evaluate responses using AI:

OFF

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is latency?

a delay in the transfer of data

an encryption code

a type of crypto-currency

a type of malware

7.

REORDER QUESTION

30 sec • 10 pts

Reorder the following steps for using FileZilla

Enter IP address of remote machine in Host Field

On remote site, find file(s) to copy

Right-click file & choose "Upload"

Select files to copy under Local Site

Enter username & Password

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?