
10.2 Cybersecurity
Authored by Kelly odell
Computers
9th - 12th Grade
Used 28+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attempt to connect to a server by capturing and resending authentication information.
Email Attack
Browser Attack
Man-in-the-Middle Attack
Replay Attack
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
Pretexting
Email Attack
Browser Attack
Man-in-the-Middle Attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Convincing a victim that they are performing a legitimate task within their web browser window when, in fact, they are being tricked into revealing sensitive information or installing malware on their computer.
Social Engineering
Reconnaissance
Pretexting
Browser Attack
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Exploiting a victim using email messages.
Social Engineering
Reconnaissance
Pretexting
Email Attack
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Tricking a victim into revealing sensitive information under false pretenses.
Snooping
Wiretapping
Reconnaissance
Pretexting
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The passive gathering of information about a potential victim.
Social Engineering
Reconnaissance
Pretexting
Email Attack
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The use of deception to gain personal and/or private information for unlawful purposes.
Impersonation
Denial of Service
Malware
Social Engineering
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?