Cybersecurity Chapter 3

Cybersecurity Chapter 3

11th Grade

9 Qs

quiz-placeholder

Similar activities

Prevention

Prevention

1st Grade - Professional Development

10 Qs

Empowerment Technologies Lesson 2

Empowerment Technologies Lesson 2

11th - 12th Grade

13 Qs

1.5.3 - Starter Tasks/Network Threats (Dg)

1.5.3 - Starter Tasks/Network Threats (Dg)

11th Grade

12 Qs

Security of data

Security of data

11th Grade

10 Qs

11°01 Quiz 2 TP

11°01 Quiz 2 TP

11th Grade

10 Qs

Chapter 8: Safety and security

Chapter 8: Safety and security

10th - 11th Grade

14 Qs

AP CSP Unit 8 Review

AP CSP Unit 8 Review

11th Grade

12 Qs

IT Security Threats

IT Security Threats

10th - 12th Grade

11 Qs

Cybersecurity Chapter 3

Cybersecurity Chapter 3

Assessment

Quiz

Computers

11th Grade

Hard

Created by

E Sheng Toh

Used 1+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a rootkit modify?

Empty the browser cache.

Delete unused software.

Operating system.

Keep software up to date.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a vulnerability that allows criminals to inject scripts into web pages viewed by users?

SQL injection

Cross-site scripting

buffer overflow

XML injection

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two ways to protect a computer from malware? (Choose two.)

Delete unused software.

Use antivirus software.

Empty the browser cache.

Defragment the hard disk.

Keep software up to date.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two of the tactics used by a social engineer to obtain personal information from an unsuspecting target? (Choose two.)

integrity

Impersonation

urgency

compassion

honesty

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker is sitting in front of a store and wirelessly copies emails and contact lists from nearby unsuspecting user devices. What type

this?

bluesnarfing

RF jamming

bluejacking

smishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe an email that is targeting a specific person employed at a financial institution?

spear phishing

vishing

spyware

target phishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name for the type of software that generates revenue by generating annoying pop-ups?

trackers

spyware

adware

pop-ups

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What occurs on a computer when data goes beyond the limits of a buffer?

an SQL injection

a system exception

cross-site scripting

a buffer overflow

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A criminal is using software to obtain information about the computer of a user. What is the name of this type of software?

adware

virus

spyware

phishing