Cybersecurity Lesson 7.1 Review
Quiz
•
Computers
•
9th Grade
•
Medium
Gerry Wartenberg
Used 4+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
What is the definition of Reconnaissance in the context of cybersecurity?
The process of removing malware from a computer system.
The act of defending a network against unauthorized access.
The practice of gathering information about targeted computers or networks as a preliminary step toward a further attack.
The method of encrypting sensitive information to protect it from attackers.
2.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
What does the Recon / Footprinting step in hacking include?
Techniques to create a full profile of the organization's financial status
Techniques used to create a full profile of the organization and its security posture, including its domain names, IP addresses, and network blocks
Techniques for identifying the personal details of the organization's employees
Techniques for creating a backup of the organization's data
3.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
During reconnaissance, what information is gathered about hosts?
Their physical locations
Their IP addresses and open ports
Their color and size
Their brand and model
4.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
What is Google Dorking?
A) A game played using Google search
B) The usage of Advanced Search Operators in a Google search
C) A type of hacking attack
D) A Google service for finding images
5.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
What happens when you use quotation marks around a set of words in Google search?
A) It excludes those words from the search
B) It searches for each word individually
C) It tells Google to search for the exact phrase
D) It has no effect on the search results
6.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
What is a Google Dork also known as?
Google Trick
Google Search
Google Hack
Google Quest
7.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
What does the GHDB specifically target?
A) Google's search algorithms
B) Websites with specific types of vulnerabilities such as posted usernames, passwords, or login portals
C) Google's internal databases
D) Bots performing automated searches
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
15 questions
File Management
Quiz
•
8th - 9th Grade
20 questions
Mengenal Web Browser TIK
Quiz
•
9th Grade
18 questions
Binary and Linear Search
Quiz
•
9th - 12th Grade
20 questions
Informatika kelas 9
Quiz
•
9th Grade
20 questions
05 - The Internet Quiz
Quiz
•
9th - 12th Grade
20 questions
Kuis Search Engine
Quiz
•
1st Grade - Professio...
20 questions
Quiz
•
7th - 12th Grade
15 questions
dasar-dasar penggunaan internet/intranet
Quiz
•
9th Grade
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
30 questions
Computer Terminology Exercise #1 ( Fill Ins)
Quiz
•
9th Grade
15 questions
MLA Formatting
Quiz
•
9th Grade
20 questions
Typing Practice
Quiz
•
7th - 12th Grade
14 questions
Inputs and Outputs: Computer Science Intro
Lesson
•
5th - 9th Grade
20 questions
Google Sheets Quiz
Quiz
•
9th Grade