Cybersecurity Chapter 1 to 3 summary

Cybersecurity Chapter 1 to 3 summary

11th Grade

30 Qs

quiz-placeholder

Similar activities

[AP CSP] Types of Malware

[AP CSP] Types of Malware

9th - 12th Grade

25 Qs

OCR Computer Science 1.4.1

OCR Computer Science 1.4.1

9th - 11th Grade

30 Qs

IT Fundamentals:  6.0 Security

IT Fundamentals: 6.0 Security

11th - 12th Grade

29 Qs

CSCU Chapter 1-10

CSCU Chapter 1-10

11th Grade

25 Qs

Cybersecurity Actors and Vulnerabilities Part 1

Cybersecurity Actors and Vulnerabilities Part 1

9th - 12th Grade

25 Qs

Cybersecurity and Privacy Quiz

Cybersecurity and Privacy Quiz

11th Grade

25 Qs

Cybersecurity - Malware and Phishing

Cybersecurity - Malware and Phishing

9th - 12th Grade

30 Qs

Living Online Review Part 2

Living Online Review Part 2

6th - 12th Grade

25 Qs

Cybersecurity Chapter 1 to 3 summary

Cybersecurity Chapter 1 to 3 summary

Assessment

Quiz

Computers

11th Grade

Hard

Created by

E Sheng Toh

Used 3+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name is given to hackers who hack for a cause?

hactivist

white hat

blue hat

hacker

Answer explanation

The term is used to describe gray hackers who rally and protect for a cause.

The correct answer is: hactivist

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

APT

algorithm

DDoS

exhaustion

Answer explanation

Algorithm attacks can force computers to use memory or overwork the CPU.

The correct answer is: algorithm

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term BYOD represent?

bring your own device

bring your own disaster

bring your own decision

buy your own disaster

Answer explanation

The term bring-your-own-device is used to describe mobile devices such as iPhones, smartphones, tablets, and other devices,

The correct answer is: bring your own device

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name is given to a amateur hacker?

blue team

red hat

script kiddie

black hat

Answer explanation

Script kiddies is a term used to describe inexperienced hackers.

The correct answer is: script kiddie

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an Internet data domain?

Cisco

Linkedin

Palo Alto

Juniper

Answer explanation

A data domain is a repository for data.

The correct answer is: Linkedin

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

ping sweep

DDoS

DoS

spoof

Answer explanation

DDoS is is an attack that involves multiple systems. DoS involves only a single attack system.

The correct answer is: DDoS

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What service determines which resources a user can access along with the operations that a user can perform?

authorization

authentication

accounting

biometric

Answer explanation

Authorization determines whether a user has certain access privileges.

The correct answer is: authorization

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?