Unit 8 Cybersecurity Review

Unit 8 Cybersecurity Review

11th Grade

40 Qs

quiz-placeholder

Similar activities

ITGS_12_QUIZ-02

ITGS_12_QUIZ-02

11th - 12th Grade

40 Qs

YEAR 11 DATA PROCESSING SECOND TERM UNIFIED TEST

YEAR 11 DATA PROCESSING SECOND TERM UNIFIED TEST

9th - 12th Grade

40 Qs

QUIZ: HOW THE INTERNET WORKS

QUIZ: HOW THE INTERNET WORKS

9th - 12th Grade

40 Qs

R050: TA04 Cybersecurity and legislation

R050: TA04 Cybersecurity and legislation

11th Grade

38 Qs

OCR J277 GCSE Paper 1 Recap

OCR J277 GCSE Paper 1 Recap

9th Grade - University

35 Qs

Unit 1 Advanced Cybersecurity

Unit 1 Advanced Cybersecurity

11th Grade

35 Qs

Unit 2 Global Information Cambridge Technicals IT L3

Unit 2 Global Information Cambridge Technicals IT L3

10th - 12th Grade

42 Qs

2019 Review - III, IGCSE CS 0478 - dfm

2019 Review - III, IGCSE CS 0478 - dfm

9th - 12th Grade

42 Qs

Unit 8 Cybersecurity Review

Unit 8 Cybersecurity Review

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Megan Cullen

Used 1+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

____________ is a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.

Keylogging

Phishing

Malware

Decryption

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Asymmetric Key Encryption is also known as:

Caesar Cipher

Decryption

Public Key Encryption

Private Key Encryption

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is information about an individual that identifies, links, relates, or describes them?

User History

Cookies

Cache

Personally Identifiable Information

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

A

B

C

D

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following best describes a Distributed Denial of Service (DDoS) attack?

An attempt by a country to deny its citizens access to the Internet

An attempt to deny users access to a Web site's resources by flooding the Web site with requests from multiple systems

An attempt by one user to deny service to another user by posting material on a social network

An attempt by a user of the Internet to get private information from a secure database

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

A

B

C

D

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

A

B

C

D

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?