Cybersecurity Lesson 7.1 Review

Cybersecurity Lesson 7.1 Review

9th Grade

20 Qs

quiz-placeholder

Similar activities

Computer Terminology

Computer Terminology

8th - 12th Grade

20 Qs

Computer Pioneers - Charles Babbage & others

Computer Pioneers - Charles Babbage & others

9th Grade

20 Qs

Gmail and Google search terms

Gmail and Google search terms

8th - 12th Grade

17 Qs

AQA GCSE Computer Science - 3.1.4 Sorting Algorithms

AQA GCSE Computer Science - 3.1.4 Sorting Algorithms

8th - 10th Grade

18 Qs

iGCSE Computer Science: Problem Solving

iGCSE Computer Science: Problem Solving

9th - 12th Grade

20 Qs

Technology at Home

Technology at Home

KG - 12th Grade

20 Qs

Kuis Kelas 9

Kuis Kelas 9

9th Grade

15 Qs

Fitur Lanjut Browser & Blog Test

Fitur Lanjut Browser & Blog Test

9th Grade

20 Qs

Cybersecurity Lesson 7.1 Review

Cybersecurity Lesson 7.1 Review

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Gerry Wartenberg

Used 4+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 2 pts

What is the definition of Reconnaissance in the context of cybersecurity?

The process of removing malware from a computer system.

The act of defending a network against unauthorized access.

The practice of gathering information about targeted computers or networks as a preliminary step toward a further attack.

The method of encrypting sensitive information to protect it from attackers.

2.

MULTIPLE CHOICE QUESTION

45 sec • 2 pts

What does the Recon / Footprinting step in hacking include?

Techniques to create a full profile of the organization's financial status

Techniques used to create a full profile of the organization and its security posture, including its domain names, IP addresses, and network blocks

Techniques for identifying the personal details of the organization's employees

Techniques for creating a backup of the organization's data

3.

MULTIPLE CHOICE QUESTION

45 sec • 2 pts

During reconnaissance, what information is gathered about hosts?

Their physical locations

Their IP addresses and open ports

Their color and size

Their brand and model

4.

MULTIPLE CHOICE QUESTION

45 sec • 2 pts

What is Google Dorking?

A) A game played using Google search

B) The usage of Advanced Search Operators in a Google search

C) A type of hacking attack

D) A Google service for finding images

5.

MULTIPLE CHOICE QUESTION

45 sec • 2 pts

What happens when you use quotation marks around a set of words in Google search?

A) It excludes those words from the search

B) It searches for each word individually

C) It tells Google to search for the exact phrase

D) It has no effect on the search results

6.

MULTIPLE CHOICE QUESTION

45 sec • 2 pts

What is a Google Dork also known as?

Google Trick

Google Search

Google Hack

Google Quest

7.

MULTIPLE CHOICE QUESTION

45 sec • 2 pts

What does the GHDB specifically target?

A) Google's search algorithms

B) Websites with specific types of vulnerabilities such as posted usernames, passwords, or login portals

C) Google's internal databases

D) Bots performing automated searches

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?