AP Computer Science Principles - Unit 10: Cybersecurity

AP Computer Science Principles - Unit 10: Cybersecurity

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Unit 10 Quiz

Unit 10 Quiz

11th Grade

10 Qs

AP CSP Vocabulary

AP CSP Vocabulary

9th - 12th Grade

12 Qs

Security

Security

12th Grade - University

12 Qs

Data Protection part 2

Data Protection part 2

12th Grade

15 Qs

CSP Unit 10 Pre-Assessment - Cybersecurity

CSP Unit 10 Pre-Assessment - Cybersecurity

9th - 12th Grade

10 Qs

Unit 10 AP CSP Advanced

Unit 10 AP CSP Advanced

9th - 12th Grade

10 Qs

AP Computer Science Unit 10

AP Computer Science Unit 10

9th - 12th Grade

12 Qs

Lesson 18 Vocabuary

Lesson 18 Vocabuary

12th Grade

15 Qs

AP Computer Science Principles - Unit 10: Cybersecurity

AP Computer Science Principles - Unit 10: Cybersecurity

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Mister Swagner

Used 100+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is software intended to damage a computing system or to take partial control over it?
Computing Innovation
Malware
Encryption
Decryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a wireless access point that gives unauthorized access to secure networks?
Keylogging
Rogue Access Point
Computing Innovation
Malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following refers to a process of encoding messages to keep them secret?
Encryption
Multi-factor Authentication
Public Key Encryption
Symmetric Key Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a technique that attempts to trick a user into providing personal information?
Phishing
Computing Innovation
Personally Identifiable Information (PII)
Keylogging

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a system that requires at least two steps to unlock protected information?
Multi-factor Authentication
Encryption
Symmetric Key Encryption
Public Key Encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is information about an individual that identifies, links, relates, or describes them?
Keylogging
Malware
Computing Innovation
Personally Identifiable Information (PII)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following involves one key for both encryption and decryption?
Public Key Encryption
Symmetric Key Encryption
Multi-factor Authentication
Encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?