Search Header Logo

Internet Connectivity and Cybersecurity Quiz

Authored by Adam Dennison

Computers

10th Grade

Used 1+ times

Internet Connectivity and Cybersecurity Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best explains what happens when a new device is connected to the Internet?

A device driver is assigned to the device.

An Internet Protocol (IP) address is assigned to the device.

A packet number is assigned to the device.

A Web site is assigned to the device.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following activities poses the greatest personal cybersecurity risk?

Making a purchase on an online store that uses public key encryption to transmit information

Paying a bill using a secure online electronic payment system

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered a secure method of online communication?

Purchasing a couch by emailing a credit card number to the couch owner

Checking a bank account on a bank’s website that uses HTTPS for secure communication

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is LEAST likely to indicate a phishing attack?

An email from a website asks that you click on a link to reset your password.

An email from your bank asks you to call the number on your card to verify a transaction.

An email from your water utility company asks you to enter your date of birth and social security number for verification purposes.

An email indicates you have won money, and asks you to enter your bank account number so the money can be transferred

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are true statements about digital certificates in Web browsers? I. Digital certificates are used to verify the ownership of encrypted keys used in secure communication. II. Digital certificates are used to verify that the connection to a Web site is fault tolerant.

I only

II only

I and II

Neither I nor II

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?

mail.example.com

example.org

example

com.example

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes how the file is sent back to the user?

The file is broken into packets and sent over a network. The packets must be reassembled by the user’s computer when they are received. If any packets are missing, the browser re-requests the missing packets.

The file is broken into packets and sent over a network. The user’s browser must request each packet, in order, until all packets are received.

The server attempts to connect directly to the user’s computer. If the connection is successful, the entire file is sent at once. If the connection is unsuccessful, an error message is sent to the user.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?