Search Header Logo

IAS1 - LAP5 - 3D

Authored by jay stewart

Information Technology (IT)

12th Grade

Used 5+ times

IAS1 - LAP5 - 3D
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is an attack in the context of cybersecurity?

An act that takes advantage of a vulnerability

A type of malware

A method of data encryption

A security protocol

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does malicious code include?

Viruses and worms

Firewalls

Encryption software

Antivirus programs

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a bot in cybersecurity?

An automated software program

A type of virus

A security measure

A network protocol

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a hoax in the context of cybersecurity?

A false warning about a virus

A type of malware

A security breach

A method of data recovery

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a back door in cybersecurity?

An unauthorized access point

A type of firewall

A method of data encryption

A security protocol

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is password cracking?

Reversing a hashed password

Creating a new password

Encrypting a password

Storing a password securely

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a brute force attack?

Trying every possible password combination

Using a dictionary of common passwords

Exploiting a software vulnerability

Sending a large number of requests to a server

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?