AP Computer Science Principles - Unit 10: Cybersecurity

AP Computer Science Principles - Unit 10: Cybersecurity

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Unit 4 Big Data

Unit 4 Big Data

10th - 12th Grade

11 Qs

ENCRYPTION AND CYBERCRIME

ENCRYPTION AND CYBERCRIME

7th - 10th Grade

15 Qs

Encryption

Encryption

9th - 11th Grade

10 Qs

MOVIE

MOVIE

11th Grade

10 Qs

J277 Utility Software (Encryption & Defragmentation)

J277 Utility Software (Encryption & Defragmentation)

10th - 12th Grade

10 Qs

Quantum Cryptography Quiz

Quantum Cryptography Quiz

11th Grade

15 Qs

OCR A Level CS - 1.3.3 Networks

OCR A Level CS - 1.3.3 Networks

12th Grade

13 Qs

014_Key Exchange - CompTIA Security+ SY0-701 - 1.4

014_Key Exchange - CompTIA Security+ SY0-701 - 1.4

12th Grade - University

15 Qs

AP Computer Science Principles - Unit 10: Cybersecurity

AP Computer Science Principles - Unit 10: Cybersecurity

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Mister Swagner

Used 102+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is software intended to damage a computing system or to take partial control over it?
Computing Innovation
Malware
Encryption
Decryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a wireless access point that gives unauthorized access to secure networks?
Keylogging
Rogue Access Point
Computing Innovation
Malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following refers to a process of encoding messages to keep them secret?
Encryption
Multi-factor Authentication
Public Key Encryption
Symmetric Key Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a technique that attempts to trick a user into providing personal information?
Phishing
Computing Innovation
Personally Identifiable Information (PII)
Keylogging

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a system that requires at least two steps to unlock protected information?
Multi-factor Authentication
Encryption
Symmetric Key Encryption
Public Key Encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is information about an individual that identifies, links, relates, or describes them?
Keylogging
Malware
Computing Innovation
Personally Identifiable Information (PII)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following involves one key for both encryption and decryption?
Public Key Encryption
Symmetric Key Encryption
Multi-factor Authentication
Encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?