Search Header Logo

Cybersecurity Chapter 1&2

Authored by ESTHER _

Design

6th Grade

Used 1+ times

Cybersecurity Chapter 1&2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Threat?

Something bad that COULD happen

A weakness in a system that could be exploited

A vulnerability that is exploited and system is compromised

Actions taken by a malicious intruder

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is not under CIA

Integrity

Authenticity

Confidentiality

Availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Kerckoff's Principle

Hide Algorithm, Make Key known publicly

Hide key and algorithm

Hide key, make algorithm known publicly

Make algorithm and key known publicly

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How to identify whether host is present on the network?

Traceroute

Ping

IPconfig

IFconfig

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Traceroute calculates and displays the amount of time for each hop. True or False?

True

False

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are key router functions?

Error Detection in IP Packet

Send the packets from incoming to outgoing link

Runs routing protocol

Changes the data in the IP Packet

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

RAM is ____ shared by programs in the computer

Physically

Virtually

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?