Search Header Logo

AP CSP Internet Cybersecurity and Ethics

Authored by Wayground Content

Computers

9th - 12th Grade

Used 21+ times

AP CSP Internet Cybersecurity and Ethics
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Virus

A type of malicious software that spreads through email attachments.

A type of malicious software (malware) that attaches itself to a legitimate file or program and spreads when the infected file is executed, potentially harming the system.

A program that protects against malware and viruses.

A type of software that enhances system performance.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Symmetric Encryption

A type of encryption that uses different keys for encrypting and decrypting data.

A type of encryption where the same key is used for both encrypting and decrypting data. It is fast but requires secure key distribution.

A method of encryption that is slow but highly secure.

An encryption technique that does not require any keys.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cookies

Small pieces of data stored on a user's device by websites to track user activity, remember preferences, and enable personalized experiences.

A type of dessert made from flour, sugar, and other ingredients.

A programming language used for web development.

A method of data encryption used for secure communication.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DDoS Attack (Distributed Denial of Service Attack)

A cyberattack where multiple systems flood a target with excessive requests, overwhelming it and causing a denial of service for legitimate users.

A method of securing a network by limiting access to authorized users only.

A type of malware that infects a system and steals sensitive information.

A technique used to enhance the performance of a website by distributing traffic across multiple servers.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption

The process of converting plaintext data into an unreadable format (ciphertext) to protect it from unauthorized access.

A method of compressing data to save storage space.

The technique of backing up data to prevent loss.

A way to enhance the speed of data transmission.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rogue Access Point

A legitimate access point installed by the network administrator.

An unauthorized wireless access point that can intercept sensitive data.

A type of firewall used to protect a network.

A device that boosts the signal of a wireless network.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Digital Certificate

An electronic document used to prove the ownership of a public key.

A physical card used for identity verification.

A type of software that encrypts data on a device.

A hardware device that stores passwords.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?