Search Header Logo

CyberSecurity Review

Authored by Donna Panter

Computers

9th - 12th Grade

CCSS covered

Used 57+ times

CyberSecurity Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

42 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company develops a mobile app designed for parents to monitor what their children are doing. The parents install the app on the phone, and it can record details like who the child is conversing with and what apps they're using. It can also record and store the geolocation of the child.

Which of these questions from parents could not be answered by the recorded geolocation data?

Did my child hang out in the park in a group of more than 20 people?

Did my child travel to another city today?

Did my child break their curfew by staying outside of the home past 9pm?

Did my child spend more than an hour outside of the school campus in the middle of the day?

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

BBC News wrote an article with this headline:

"HP laptops found to have hidden keylogger"

After reading that headline, what should HP laptop owners be most concerned about?

The keylogger could be recording what they type and sending the logs to a server.

The keylogger could be overwriting their files with random generated text.

The keylogger could be sending emails to all of their contacts with malware attached.

The keylogger could be using up their computing power to mine for cryptocurrency.

Tags

CCSS.RI.11-12.10

CCSS.RI.6.10

CCSS.RI.7.10

CCSS.RI.8.10

CCSS.RI.9-10.10

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An investigative journalist connects to the Internet over a wired Ethernet connection in a government building. They don't want anyone else to see which websites they're visiting.

Which entities might be able to see the websites visited in that browsing session?

- I. A rogue access point

- II. The building's Internet Service Provider (ISP)

- III. Their computer's web browser

I and II only

II and III only

I and III only

I, II, and III

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes symmetric encryption?

An encryption scheme where the sender and receiver use the same shared key for encrypting and decrypting data.

An encryption scheme where the sender and receiver each have their own key for encrypting and decrypting data.

An encryption scheme where the sender encrypts data with the receiver's public key and the receiver decrypts the data with their own private key.

An encryption scheme where the sender encrypts data with the sender's public key and the receiver decrypts the data with the sender's private key.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Aliza visited a website over HTTPS and saw a lock icon in the URL bar, indicating a secure connection with a valid digital certificate.

Which of these statements describes the trust model in this scenario?

The browswer trusts Aliza, Aliza trusts the certificate authority, and the certificate authority trusts the website.

Aliza trusts the certificate authority, the certificate authority trusts the browser, and the browser trusts the website.

The certificate authority trusts Aliza, Aliza trusts the browser, and the browser trusts the website.

Aliza trusts the browser, the browser trusts the certificate authority, and the certificate authority trusts the website.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement is true about multi-factor authentication?

MFA requires the user to reveal PII in order to authenticate.

MFA adds an additional level of security to the authentication process

MFA adds a layer of encryption to online authentication.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

MFA requires evidence from at least two authentication factors.

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?