
CyberSecurity Review
Authored by Donna Panter
Computers
9th - 12th Grade
CCSS covered
Used 57+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
42 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company develops a mobile app designed for parents to monitor what their children are doing. The parents install the app on the phone, and it can record details like who the child is conversing with and what apps they're using. It can also record and store the geolocation of the child.
Which of these questions from parents could not be answered by the recorded geolocation data?
Did my child hang out in the park in a group of more than 20 people?
Did my child travel to another city today?
Did my child break their curfew by staying outside of the home past 9pm?
Did my child spend more than an hour outside of the school campus in the middle of the day?
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
BBC News wrote an article with this headline:
"HP laptops found to have hidden keylogger"
After reading that headline, what should HP laptop owners be most concerned about?
The keylogger could be recording what they type and sending the logs to a server.
The keylogger could be overwriting their files with random generated text.
The keylogger could be sending emails to all of their contacts with malware attached.
The keylogger could be using up their computing power to mine for cryptocurrency.
Tags
CCSS.RI.11-12.10
CCSS.RI.6.10
CCSS.RI.7.10
CCSS.RI.8.10
CCSS.RI.9-10.10
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An investigative journalist connects to the Internet over a wired Ethernet connection in a government building. They don't want anyone else to see which websites they're visiting.
Which entities might be able to see the websites visited in that browsing session?
- I. A rogue access point
- II. The building's Internet Service Provider (ISP)
- III. Their computer's web browser
I and II only
II and III only
I and III only
I, II, and III
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes symmetric encryption?
An encryption scheme where the sender and receiver use the same shared key for encrypting and decrypting data.
An encryption scheme where the sender and receiver each have their own key for encrypting and decrypting data.
An encryption scheme where the sender encrypts data with the receiver's public key and the receiver decrypts the data with their own private key.
An encryption scheme where the sender encrypts data with the sender's public key and the receiver decrypts the data with the sender's private key.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Aliza visited a website over HTTPS and saw a lock icon in the URL bar, indicating a secure connection with a valid digital certificate.
Which of these statements describes the trust model in this scenario?
The browswer trusts Aliza, Aliza trusts the certificate authority, and the certificate authority trusts the website.
Aliza trusts the certificate authority, the certificate authority trusts the browser, and the browser trusts the website.
The certificate authority trusts Aliza, Aliza trusts the browser, and the browser trusts the website.
Aliza trusts the browser, the browser trusts the certificate authority, and the certificate authority trusts the website.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement is true about multi-factor authentication?
MFA requires the user to reveal PII in order to authenticate.
MFA adds an additional level of security to the authentication process
MFA adds a layer of encryption to online authentication.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
MFA requires evidence from at least two authentication factors.
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
38 questions
Cyber 1 Module 1 Review
Quiz
•
10th Grade
40 questions
ULANGAN HARIAN DASAR DESAIN GRAFIS
Quiz
•
10th Grade
39 questions
GR7_Unit 4: Networks (Lesson 8.1.6 )
Quiz
•
8th Grade - University
45 questions
TryOut Ujian Sekolah Pengetahuan - TIK SMP N 1 JEPARA
Quiz
•
12th Grade
44 questions
Movies
Quiz
•
2nd Grade - Professio...
40 questions
Remidi DKV1
Quiz
•
10th Grade
40 questions
Pemrograman1
Quiz
•
10th Grade
39 questions
ข้อสอบโลกดาราศาสตร์
Quiz
•
10th Grade
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
10 questions
Exploring Valentine's Day with Charlie Brown
Interactive video
•
6th - 10th Grade
18 questions
Valentines Day Trivia
Quiz
•
3rd Grade - University
20 questions
El Verbo IR Practice
Quiz
•
9th Grade
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
10 questions
Valentine's Day History and Traditions
Interactive video
•
6th - 10th Grade
20 questions
Graphing Inequalities on a Number Line
Quiz
•
6th - 9th Grade
20 questions
Exponent Properties
Quiz
•
9th Grade
21 questions
Presidents Day Trivia
Quiz
•
6th - 12th Grade