AP CSP Internet Cybersecurity and Ethics

AP CSP Internet Cybersecurity and Ethics

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

TEKS.MATH.9-12.VI.B.3

TEKS.MATH.9-12.VI.B.3

Finding the Zeros of Quadratic Functions

Finding the Zeros of Quadratic Functions

Relative and Absolute Dating Review

Relative and Absolute Dating Review

Sickle Cell

Sickle Cell

CCSS.Math.Content.8.EE.C.7

CCSS.Math.Content.8.EE.C.7

Amplify Unit 3 Earth's Features

Amplify Unit 3 Earth's Features

Review of Function Notation and Evaluating Functions

Review of Function Notation and Evaluating Functions

Learned vs Inherited Traits

Learned vs Inherited Traits

AP CSP Internet Cybersecurity and Ethics

AP CSP Internet Cybersecurity and Ethics

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Easy

Created by

Wayground Content

Used 21+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Virus

A type of malicious software that spreads through email attachments.

A type of malicious software (malware) that attaches itself to a legitimate file or program and spreads when the infected file is executed, potentially harming the system.

A program that protects against malware and viruses.

A type of software that enhances system performance.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Symmetric Encryption

A type of encryption that uses different keys for encrypting and decrypting data.

A type of encryption where the same key is used for both encrypting and decrypting data. It is fast but requires secure key distribution.

A method of encryption that is slow but highly secure.

An encryption technique that does not require any keys.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cookies

Small pieces of data stored on a user's device by websites to track user activity, remember preferences, and enable personalized experiences.

A type of dessert made from flour, sugar, and other ingredients.

A programming language used for web development.

A method of data encryption used for secure communication.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DDoS Attack (Distributed Denial of Service Attack)

A cyberattack where multiple systems flood a target with excessive requests, overwhelming it and causing a denial of service for legitimate users.

A method of securing a network by limiting access to authorized users only.

A type of malware that infects a system and steals sensitive information.

A technique used to enhance the performance of a website by distributing traffic across multiple servers.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption

The process of converting plaintext data into an unreadable format (ciphertext) to protect it from unauthorized access.

A method of compressing data to save storage space.

The technique of backing up data to prevent loss.

A way to enhance the speed of data transmission.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rogue Access Point

A legitimate access point installed by the network administrator.

An unauthorized wireless access point that can intercept sensitive data.

A type of firewall used to protect a network.

A device that boosts the signal of a wireless network.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Digital Certificate

An electronic document used to prove the ownership of a public key.

A physical card used for identity verification.

A type of software that encrypts data on a device.

A hardware device that stores passwords.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?