
Introduction to Cybersecurity Final Exam Units 1-8
Authored by Anthony DellaRosa
Computers
9th - 12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
85 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Vulnerabilities can be found in technology products including operating systems, software applications and hardware devices.
True
False
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Anyone can access the Common Vulnerabilities and Exposures (CVE)?
True
False
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Should you install updates?
Yes
No
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The data that has been encrypted is called...
Ciphertext
Algorithm
Plaintext
Code
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the CIA Triad - the "C" stands for:
Congressional
Communication
Confidentiality
Continuation
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A one-way algorithm used to encrypt a password for secure storage or transfer.
Hash
Single Sign-On
SAM registry
Encoding
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a phishing attack that targets a specific individual or organization?
Vishing
Smishing
Spear-phishing
Wishing
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?