
CyberSecurity Review
Quiz
•
Computers
•
9th - 12th Grade
•
Medium
+19
Standards-aligned
Donna Panter
Used 57+ times
FREE Resource
Enhance your content
42 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company develops a mobile app designed for parents to monitor what their children are doing. The parents install the app on the phone, and it can record details like who the child is conversing with and what apps they're using. It can also record and store the geolocation of the child.
Which of these questions from parents could not be answered by the recorded geolocation data?
Did my child hang out in the park in a group of more than 20 people?
Did my child travel to another city today?
Did my child break their curfew by staying outside of the home past 9pm?
Did my child spend more than an hour outside of the school campus in the middle of the day?
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
BBC News wrote an article with this headline:
"HP laptops found to have hidden keylogger"
After reading that headline, what should HP laptop owners be most concerned about?
The keylogger could be recording what they type and sending the logs to a server.
The keylogger could be overwriting their files with random generated text.
The keylogger could be sending emails to all of their contacts with malware attached.
The keylogger could be using up their computing power to mine for cryptocurrency.
Tags
CCSS.RI.11-12.10
CCSS.RI.6.10
CCSS.RI.7.10
CCSS.RI.8.10
CCSS.RI.9-10.10
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An investigative journalist connects to the Internet over a wired Ethernet connection in a government building. They don't want anyone else to see which websites they're visiting.
Which entities might be able to see the websites visited in that browsing session?
- I. A rogue access point
- II. The building's Internet Service Provider (ISP)
- III. Their computer's web browser
I and II only
II and III only
I and III only
I, II, and III
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes symmetric encryption?
An encryption scheme where the sender and receiver use the same shared key for encrypting and decrypting data.
An encryption scheme where the sender and receiver each have their own key for encrypting and decrypting data.
An encryption scheme where the sender encrypts data with the receiver's public key and the receiver decrypts the data with their own private key.
An encryption scheme where the sender encrypts data with the sender's public key and the receiver decrypts the data with the sender's private key.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Aliza visited a website over HTTPS and saw a lock icon in the URL bar, indicating a secure connection with a valid digital certificate.
Which of these statements describes the trust model in this scenario?
The browswer trusts Aliza, Aliza trusts the certificate authority, and the certificate authority trusts the website.
Aliza trusts the certificate authority, the certificate authority trusts the browser, and the browser trusts the website.
The certificate authority trusts Aliza, Aliza trusts the browser, and the browser trusts the website.
Aliza trusts the browser, the browser trusts the certificate authority, and the certificate authority trusts the website.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement is true about multi-factor authentication?
MFA requires the user to reveal PII in order to authenticate.
MFA adds an additional level of security to the authentication process
MFA adds a layer of encryption to online authentication.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
MFA requires evidence from at least two authentication factors.
True
False
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
38 questions
KTGK 1 Tin 11 KNTT
Quiz
•
11th Grade
45 questions
Prueba Ingresos HFA
Quiz
•
1st - 12th Grade
38 questions
ÔN TẬP GK2 - TIN HỌC 12
Quiz
•
12th Grade
42 questions
TIN HỌC KHỐI 5 HK1
Quiz
•
1st Grade - University
40 questions
Komponen Utama Sistem Komputer dan Jaringan Komputer
Quiz
•
10th Grade
40 questions
EQUIPOS INFORMÁTICOS
Quiz
•
11th Grade
40 questions
ULANGAN INFORMATIKA
Quiz
•
12th Grade
40 questions
AÇIK KAYNAK İŞLETİM SİSTEMLERİ
Quiz
•
11th Grade
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
11 questions
NEASC Extended Advisory
Lesson
•
9th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
10 questions
Boomer ⚡ Zoomer - Holiday Movies
Quiz
•
KG - University
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
20 questions
Multiplying and Dividing Integers
Quiz
•
7th Grade
Discover more resources for Computers
18 questions
Artificial Intelligence and Machine Learning Quiz
Quiz
•
9th Grade
35 questions
Computer Terminology Exercise #1 ( Multiple Choice)
Quiz
•
9th Grade
20 questions
Computer Components Exercise #4 - CTEA
Quiz
•
9th - 12th Grade
30 questions
Computer Terminology Exercise #1 ( Fill Ins)
Quiz
•
9th Grade