AP Computer Science Principles - Unit 10: Cybersecurity

AP Computer Science Principles - Unit 10: Cybersecurity

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

AP CSP BI 5

AP CSP BI 5

9th - 12th Grade

9 Qs

C1 Cryptography & Encryption

C1 Cryptography & Encryption

11th Grade

15 Qs

Value of Privacy

Value of Privacy

9th - 10th Grade

10 Qs

Year 8 Keep it safe 2

Year 8 Keep it safe 2

6th - 10th Grade

10 Qs

Mobile Devices

Mobile Devices

9th - 12th Grade

14 Qs

Cybersecurity and Global Impacts _code.org U8

Cybersecurity and Global Impacts _code.org U8

9th Grade

12 Qs

CSP I - Unit 8 Vocabulary

CSP I - Unit 8 Vocabulary

9th Grade

13 Qs

CSP Unit 10 Cybersecurity

CSP Unit 10 Cybersecurity

9th - 12th Grade

12 Qs

AP Computer Science Principles - Unit 10: Cybersecurity

AP Computer Science Principles - Unit 10: Cybersecurity

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Mister Swagner

Used 100+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is software intended to damage a computing system or to take partial control over it?
Computing Innovation
Malware
Encryption
Decryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a wireless access point that gives unauthorized access to secure networks?
Keylogging
Rogue Access Point
Computing Innovation
Malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following refers to a process of encoding messages to keep them secret?
Encryption
Multi-factor Authentication
Public Key Encryption
Symmetric Key Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a technique that attempts to trick a user into providing personal information?
Phishing
Computing Innovation
Personally Identifiable Information (PII)
Keylogging

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a system that requires at least two steps to unlock protected information?
Multi-factor Authentication
Encryption
Symmetric Key Encryption
Public Key Encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is information about an individual that identifies, links, relates, or describes them?
Keylogging
Malware
Computing Innovation
Personally Identifiable Information (PII)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following involves one key for both encryption and decryption?
Public Key Encryption
Symmetric Key Encryption
Multi-factor Authentication
Encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?