
AP CSP Internet Cybersecurity and Ethics
Authored by Wayground Content
Computers
9th - 12th Grade
Used 21+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Virus
A type of malicious software that spreads through email attachments.
A type of malicious software (malware) that attaches itself to a legitimate file or program and spreads when the infected file is executed, potentially harming the system.
A program that protects against malware and viruses.
A type of software that enhances system performance.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Symmetric Encryption
A type of encryption that uses different keys for encrypting and decrypting data.
A type of encryption where the same key is used for both encrypting and decrypting data. It is fast but requires secure key distribution.
A method of encryption that is slow but highly secure.
An encryption technique that does not require any keys.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Cookies
Small pieces of data stored on a user's device by websites to track user activity, remember preferences, and enable personalized experiences.
A type of dessert made from flour, sugar, and other ingredients.
A programming language used for web development.
A method of data encryption used for secure communication.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
DDoS Attack (Distributed Denial of Service Attack)
A cyberattack where multiple systems flood a target with excessive requests, overwhelming it and causing a denial of service for legitimate users.
A method of securing a network by limiting access to authorized users only.
A type of malware that infects a system and steals sensitive information.
A technique used to enhance the performance of a website by distributing traffic across multiple servers.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Encryption
The process of converting plaintext data into an unreadable format (ciphertext) to protect it from unauthorized access.
A method of compressing data to save storage space.
The technique of backing up data to prevent loss.
A way to enhance the speed of data transmission.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Rogue Access Point
A legitimate access point installed by the network administrator.
An unauthorized wireless access point that can intercept sensitive data.
A type of firewall used to protect a network.
A device that boosts the signal of a wireless network.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Digital Certificate
An electronic document used to prove the ownership of a public key.
A physical card used for identity verification.
A type of software that encrypts data on a device.
A hardware device that stores passwords.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
End of term assessment
Quiz
•
9th Grade
15 questions
Quiz - Pengenalan Sistem Operasi
Quiz
•
12th Grade
21 questions
Y9 Creative iMedia RO81 Quiz Part 1
Quiz
•
9th Grade
20 questions
Repaso TIC- 1º-bach
Quiz
•
11th Grade
15 questions
Edición de Videos
Quiz
•
7th - 9th Grade
20 questions
CSS 10 - QUIZ
Quiz
•
10th Grade
16 questions
Kod Arahan
Quiz
•
9th - 11th Grade
20 questions
CSS GRADE 9 - QUIZ PECs and EM
Quiz
•
9th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade