CyberSecurity Review

CyberSecurity Review

9th - 12th Grade

42 Qs

quiz-placeholder

Similar activities

Soal Sumatif 1 - PASCAL - Fase E

Soal Sumatif 1 - PASCAL - Fase E

10th Grade

40 Qs

SIMKOMDIG

SIMKOMDIG

11th Grade

39 Qs

Konsep Jaringan Komputer

Konsep Jaringan Komputer

10th Grade

40 Qs

Soal Sumatif 1_v2 - HTML - Fase F

Soal Sumatif 1_v2 - HTML - Fase F

11th Grade

40 Qs

Quiz Merakit Laptop

Quiz Merakit Laptop

11th Grade

40 Qs

Basic Electronics (For Arduino)

Basic Electronics (For Arduino)

10th - 11th Grade

45 Qs

TKJ

TKJ

12th Grade

45 Qs

Ulangan Semester 1

Ulangan Semester 1

10th Grade

40 Qs

CyberSecurity Review

CyberSecurity Review

Assessment

Quiz

Computers

9th - 12th Grade

Medium

CCSS
RI.11-12.8, RI.11-12.10, RL.11-12.1

+19

Standards-aligned

Created by

Donna Panter

Used 57+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

42 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company develops a mobile app designed for parents to monitor what their children are doing. The parents install the app on the phone, and it can record details like who the child is conversing with and what apps they're using. It can also record and store the geolocation of the child.

Which of these questions from parents could not be answered by the recorded geolocation data?

Did my child hang out in the park in a group of more than 20 people?

Did my child travel to another city today?

Did my child break their curfew by staying outside of the home past 9pm?

Did my child spend more than an hour outside of the school campus in the middle of the day?

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

BBC News wrote an article with this headline:

"HP laptops found to have hidden keylogger"

After reading that headline, what should HP laptop owners be most concerned about?

The keylogger could be recording what they type and sending the logs to a server.

The keylogger could be overwriting their files with random generated text.

The keylogger could be sending emails to all of their contacts with malware attached.

The keylogger could be using up their computing power to mine for cryptocurrency.

Tags

CCSS.RI.11-12.10

CCSS.RI.6.10

CCSS.RI.7.10

CCSS.RI.8.10

CCSS.RI.9-10.10

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An investigative journalist connects to the Internet over a wired Ethernet connection in a government building. They don't want anyone else to see which websites they're visiting.

Which entities might be able to see the websites visited in that browsing session?

- I. A rogue access point

- II. The building's Internet Service Provider (ISP)

- III. Their computer's web browser

I and II only

II and III only

I and III only

I, II, and III

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes symmetric encryption?

An encryption scheme where the sender and receiver use the same shared key for encrypting and decrypting data.

An encryption scheme where the sender and receiver each have their own key for encrypting and decrypting data.

An encryption scheme where the sender encrypts data with the receiver's public key and the receiver decrypts the data with their own private key.

An encryption scheme where the sender encrypts data with the sender's public key and the receiver decrypts the data with the sender's private key.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Aliza visited a website over HTTPS and saw a lock icon in the URL bar, indicating a secure connection with a valid digital certificate.

Which of these statements describes the trust model in this scenario?

The browswer trusts Aliza, Aliza trusts the certificate authority, and the certificate authority trusts the website.

Aliza trusts the certificate authority, the certificate authority trusts the browser, and the browser trusts the website.

The certificate authority trusts Aliza, Aliza trusts the browser, and the browser trusts the website.

Aliza trusts the browser, the browser trusts the certificate authority, and the certificate authority trusts the website.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement is true about multi-factor authentication?

MFA requires the user to reveal PII in order to authenticate.

MFA adds an additional level of security to the authentication process

MFA adds a layer of encryption to online authentication.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

MFA requires evidence from at least two authentication factors.

True

False

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?