AP Computer Science Principles - Unit 10: Cybersecurity

AP Computer Science Principles - Unit 10: Cybersecurity

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Empowerment Technologies Quiz 2

Empowerment Technologies Quiz 2

11th Grade

10 Qs

Chapter 3 Exploring Linux Filesystems

Chapter 3 Exploring Linux Filesystems

11th Grade - University

10 Qs

C# 11

C# 11

1st - 10th Grade

10 Qs

Google Aptitude Test

Google Aptitude Test

KG - University

10 Qs

Quiz Perkakas Teknologi Digital

Quiz Perkakas Teknologi Digital

10th Grade

14 Qs

Linux: Users and Groups

Linux: Users and Groups

9th Grade - University

14 Qs

ulhar mikroprosesor

ulhar mikroprosesor

11th Grade

11 Qs

Latihan KK C XI TKJ 1 16 JAN 25

Latihan KK C XI TKJ 1 16 JAN 25

11th Grade

10 Qs

AP Computer Science Principles - Unit 10: Cybersecurity

AP Computer Science Principles - Unit 10: Cybersecurity

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Mister Swagner

Used 102+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is software intended to damage a computing system or to take partial control over it?
Computing Innovation
Malware
Encryption
Decryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a wireless access point that gives unauthorized access to secure networks?
Keylogging
Rogue Access Point
Computing Innovation
Malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following refers to a process of encoding messages to keep them secret?
Encryption
Multi-factor Authentication
Public Key Encryption
Symmetric Key Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a technique that attempts to trick a user into providing personal information?
Phishing
Computing Innovation
Personally Identifiable Information (PII)
Keylogging

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a system that requires at least two steps to unlock protected information?
Multi-factor Authentication
Encryption
Symmetric Key Encryption
Public Key Encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is information about an individual that identifies, links, relates, or describes them?
Keylogging
Malware
Computing Innovation
Personally Identifiable Information (PII)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following involves one key for both encryption and decryption?
Public Key Encryption
Symmetric Key Encryption
Multi-factor Authentication
Encryption

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers