Unit 8 Cybersecurity Review

Unit 8 Cybersecurity Review

11th Grade

40 Qs

quiz-placeholder

Similar activities

Grade 6-Sistem Komputer

Grade 6-Sistem Komputer

6th Grade - University

40 Qs

98-368 Mobility and Devices Fundamentals Study Guide

98-368 Mobility and Devices Fundamentals Study Guide

9th - 12th Grade

40 Qs

GIỮA KỲ 2 -  TIN 8

GIỮA KỲ 2 - TIN 8

8th Grade - University

36 Qs

HOJAS DE CÁLCULO SPS (2)

HOJAS DE CÁLCULO SPS (2)

11th Grade

36 Qs

PowerPoint  2016

PowerPoint 2016

7th Grade - University

40 Qs

EVALUACIÓN 11 SISTEMAS

EVALUACIÓN 11 SISTEMAS

7th - 11th Grade

40 Qs

KUIS TKJ KE-1

KUIS TKJ KE-1

1st Grade - University

40 Qs

Sistemas de Archivos: operaciones

Sistemas de Archivos: operaciones

11th Grade

40 Qs

Unit 8 Cybersecurity Review

Unit 8 Cybersecurity Review

Assessment

Quiz

Computers

11th Grade

Practice Problem

Medium

Created by

Megan Cullen

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

____________ is a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.

Keylogging

Phishing

Malware

Decryption

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Asymmetric Key Encryption is also known as:

Caesar Cipher

Decryption

Public Key Encryption

Private Key Encryption

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is information about an individual that identifies, links, relates, or describes them?

User History

Cookies

Cache

Personally Identifiable Information

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

A

B

C

D

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following best describes a Distributed Denial of Service (DDoS) attack?

An attempt by a country to deny its citizens access to the Internet

An attempt to deny users access to a Web site's resources by flooding the Web site with requests from multiple systems

An attempt by one user to deny service to another user by posting material on a social network

An attempt by a user of the Internet to get private information from a secure database

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

A

B

C

D

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

A

B

C

D

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?