Search Header Logo

Introduction to Cybersecurity Final Exam Units 1-8

Authored by Anthony DellaRosa

Computers

9th - 12th Grade

Used 1+ times

Introduction to Cybersecurity Final Exam Units 1-8
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

85 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Vulnerabilities can be found in technology products including operating systems, software applications and hardware devices.

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Anyone can access the Common Vulnerabilities and Exposures (CVE)?

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Should you install updates?

Yes

No

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The data that has been encrypted is called...

Ciphertext

Algorithm

Plaintext

Code

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the CIA Triad - the "C" stands for:

Congressional

Communication

Confidentiality

Continuation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A one-way algorithm used to encrypt a password for secure storage or transfer.

Hash

Single Sign-On

SAM registry

Encoding

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a phishing attack that targets a specific individual or organization?

Vishing

Smishing

Spear-phishing

Wishing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?