AP Computer Science Principles - Unit 10: Cybersecurity

AP Computer Science Principles - Unit 10: Cybersecurity

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Bảo mật mạng

Bảo mật mạng

11th Grade

10 Qs

IGCSE ICT - Safety and Security

IGCSE ICT - Safety and Security

10th - 12th Grade

7 Qs

BTEC DIT C3 B1 - Threats to Data

BTEC DIT C3 B1 - Threats to Data

11th Grade

11 Qs

Cryptography

Cryptography

6th Grade - University

15 Qs

Kuis Webinar Cerdas Bertelekomunikasi OTP Fraud

Kuis Webinar Cerdas Bertelekomunikasi OTP Fraud

6th Grade - Professional Development

10 Qs

Ethical and Social Issues in ICT

Ethical and Social Issues in ICT

10th Grade

15 Qs

exploring computer science

exploring computer science

9th - 12th Grade

15 Qs

J808 LO1 and LO2 planning project keywords / terms

J808 LO1 and LO2 planning project keywords / terms

9th - 11th Grade

15 Qs

AP Computer Science Principles - Unit 10: Cybersecurity

AP Computer Science Principles - Unit 10: Cybersecurity

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Easy

Created by

Mister Swagner

Used 106+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is software intended to damage a computing system or to take partial control over it?

Computing Innovation
Malware
Encryption
Decryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a wireless access point that gives unauthorized access to secure networks?

Keylogging
Rogue Access Point
Computing Innovation
Malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following refers to a process of encoding messages to keep them secret?

Encryption
Multi-factor Authentication
Public Key Encryption
Symmetric Key Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a technique that attempts to trick a user into providing personal information?

Phishing
Computing Innovation
Personally Identifiable Information (PII)
Keylogging

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a system that requires at least two steps to unlock protected information?

Multi-factor Authentication
Encryption
Symmetric Key Encryption
Public Key Encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is information about an individual that identifies, links, relates, or describes them?

Keylogging
Malware
Computing Innovation
Personally Identifiable Information (PII)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following involves one key for both encryption and decryption?

Public Key Encryption
Symmetric Key Encryption
Multi-factor Authentication
Encryption

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?