FBLA Cybersecurity

FBLA Cybersecurity

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Unit 5 Malware Exam Review

Unit 5 Malware Exam Review

Cybersecurity - Quarterly 1

Cybersecurity - Quarterly 1

Itech Quiz

Itech Quiz

Introduction to Cybersecurity Concepts

Introduction to Cybersecurity Concepts

Study Guide Part 4 (Module 5)

Study Guide Part 4 (Module 5)

Professional Workstations Quiz

Professional Workstations Quiz

Cyber 1 Module 1 Review

Cyber 1 Module 1 Review

Types of Cybersecurity Attacks

Types of Cybersecurity Attacks

FBLA Cybersecurity

FBLA Cybersecurity

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Aaron Kim

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

The IEEE Standard for PNAC is

802.1x

801.2x

802.2x

801.1x

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Malware that displays ads and collects marketing data without the user's information is called

cookies

adware

spyware

secretive data collector

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

An antivirus software does not block

Adware

PUPs

Viruses

Worms

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A backdoor is

an exploit a hacker can use to gain access to a system

the entrance to your basement

a way of access only certain people can use to bypass authentication

a small compartment in a PC used to access the inside easily

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A black hat hacker may use their abilities to

steal credit card information

develop patches for security vulnerabilities

hold personal files hostage

inform developers of security vulnerabilities

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A botnet can be used to

mine for cryptocurrency

take data hostage

spy on your computer

sell more products

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social engineering is the act of

building architecture to benefit society

tricking someone into giving you their personal info

manipulating your boss to give you a raise

telling everyone online to do something not in their best interest

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?