Cybersecurity & Intellectual Property Review

Cybersecurity & Intellectual Property Review

9th - 12th Grade

17 Qs

quiz-placeholder

Similar activities

Network Threats

Network Threats

6th - 9th Grade

19 Qs

Computer Crimes - Lesson Two

Computer Crimes - Lesson Two

9th Grade

21 Qs

Security and Ethics

Security and Ethics

9th - 12th Grade

17 Qs

Chapter 2: Ethical and Legal Issues

Chapter 2: Ethical and Legal Issues

12th Grade

18 Qs

BTEC IT Unit 1 - D threats to data & laws

BTEC IT Unit 1 - D threats to data & laws

11th - 12th Grade

20 Qs

UX, UI, Codes of Conduct, Censorship

UX, UI, Codes of Conduct, Censorship

7th - 12th Grade

20 Qs

Malware & Hacking

Malware & Hacking

10th Grade

14 Qs

CSEC Information Technology: Computer Crimes pt2

CSEC Information Technology: Computer Crimes pt2

10th Grade

20 Qs

Cybersecurity & Intellectual Property Review

Cybersecurity & Intellectual Property Review

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Julianne Calcote

Used 13+ times

FREE Resource

17 questions

Show all answers

1.

DRAG AND DROP QUESTION

1 min • 1 pt

Which of the following is not a form of biometrics? (biological attributes) (a)  

Fingerprint
Retina Scan
Smart Card
Face Recognition

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After entering a user ID and password, an online banking user must enter a PIN that was sent as a text message to the user's mobile phone.

Which of the following digital security methods is being used?

Firewall

Smart Card

DLP

Multifactor Authentication

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company wants to use multifactor authentication. Which of the following would you most likely suggest? (think of two DIFFERENT options)

Fingerprint and retinal scan

PIN and smart card

Password and passphrase

Token and smartphone

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which password attack takes advantage of people who use short, common words or combinations of words as their passwords. The hacker will try a long list of common words to figure it out?

Brute Force Attack

Traffic Interruption Attack

Keylogger Attack

Dictionary Attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which password attack takes place where an attacker tries to use every possible combination of letters and numbers?

Dictionary Attack

Brute Force Attack

Traffic Interruption Attack

Keylogger Attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is an application or string of code attached to a file that’s designed to spread from file to file.

Worms

Viruses

Trojans

Spyware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Can propagate (spread) itself without a file. A malicious software that travels across computer networks, automatically replicating itself.

Virus

Worm

Trojan

Adware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?