
Internet Connectivity and Cybersecurity Quiz
Authored by Adam Dennison
Computers
10th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
19 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best explains what happens when a new device is connected to the Internet?
A device driver is assigned to the device.
An Internet Protocol (IP) address is assigned to the device.
A packet number is assigned to the device.
A Web site is assigned to the device.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following activities poses the greatest personal cybersecurity risk?
Making a purchase on an online store that uses public key encryption to transmit information
Paying a bill using a secure online electronic payment system
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is considered a secure method of online communication?
Purchasing a couch by emailing a credit card number to the couch owner
Checking a bank account on a bank’s website that uses HTTPS for secure communication
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is LEAST likely to indicate a phishing attack?
An email from a website asks that you click on a link to reset your password.
An email from your bank asks you to call the number on your card to verify a transaction.
An email from your water utility company asks you to enter your date of birth and social security number for verification purposes.
An email indicates you have won money, and asks you to enter your bank account number so the money can be transferred
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following are true statements about digital certificates in Web browsers? I. Digital certificates are used to verify the ownership of encrypted keys used in secure communication. II. Digital certificates are used to verify that the connection to a Web site is fault tolerant.
I only
II only
I and II
Neither I nor II
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?
mail.example.com
example.org
example
com.example
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes how the file is sent back to the user?
The file is broken into packets and sent over a network. The packets must be reassembled by the user’s computer when they are received. If any packets are missing, the browser re-requests the missing packets.
The file is broken into packets and sent over a network. The user’s browser must request each packet, in order, until all packets are received.
The server attempts to connect directly to the user’s computer. If the connection is successful, the entire file is sent at once. If the connection is unsuccessful, an error message is sent to the user.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?