APCSP IOC-2.C Cybersecurity Threats
Quiz
•
Computers
•
9th - 12th Grade
•
Practice Problem
•
Easy
Beckie Lee
Used 4+ times
FREE Resource
Enhance your content in a minute
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary technique used in phishing?
Installing software to record keystrokes.
Setting up unauthorized wireless networks.
Tricking a user into providing personal information.
Intercepting data sent over public networks.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The personal information obtained through phishing is subsequently used for what purpose?
To improve the user's online experience.
To perform security updates on the user's system.
To gain fraudulent access to passwords and confidential information via keystroke recording.
To access sensitive online resources like bank accounts and emails.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does keylogging software function to obtain confidential information?
By tricking users into clicking disguised malicious links.
By recording every keystroke made by the computer user.
By creating a fake wireless access point to intercept data.
By sending unsolicited emails with malicious attachments.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What specific risk is highlighted concerning data sent over public networks?
Data automatically gets deleted after transmission.
Data transmission speed significantly decreases.
Data can be intercepted, analyzed, and modified.
Data requires multifactor authentication for viewing.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the defining characteristic of a 'rogue access point'?
It is any free Wi-Fi hotspot available in public areas.
It is a wireless access point providing unauthorized access to secure networks.
It is a program designed to record user keystrokes.
It is an email designed to trick users into revealing passwords.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user connects their laptop to an unfamiliar Wi-Fi network named 'Free_Airport_WiFi' that appears legitimate but was set up by an attacker. This scenario directly involves which specific threat mentioned in the standards?
Keylogging
Phishing
Rogue access point
Untrustworthy freeware download
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Where can malicious links be disguised?
Only within computer hardware components.
Only in system security logs.
On a web page or in an email message.
Exclusively within paid software applications.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
TIN 12_BÀI 11
Quiz
•
12th Grade
10 questions
EMPTECH L4 Q3
Quiz
•
12th Grade
15 questions
KD 3.1_Aplikasi Pengolah Angka / Spreadsheet
Quiz
•
10th Grade
20 questions
kuis informatika perangkat lunak
Quiz
•
10th - 12th Grade
14 questions
Input, output and storage de
Quiz
•
8th Grade - Professio...
10 questions
Network
Quiz
•
10th - 11th Grade
10 questions
ICT 9 Quiz 1
Quiz
•
9th Grade
20 questions
Uji Pengetahuan Jaringan Komputer
Quiz
•
9th Grade
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
15 questions
4:3 Model Multiplication of Decimals by Whole Numbers
Quiz
•
5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
The Best Christmas Pageant Ever Chapters 1 & 2
Quiz
•
4th Grade
12 questions
Unit 4 Review Day
Quiz
•
3rd Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
Discover more resources for Computers
15 questions
Internet Vocabulary Notebook Check #2 - CTEA(2024)
Quiz
•
12th Grade
11 questions
Internet Terms Vocabulary- Notebook Check #1- CTEA
Quiz
•
12th Grade
39 questions
UNIT 7 and UNIT 8 — Multiple Choice Question Bank (Extracted)
Quiz
•
9th Grade
50 questions
Money Matters Fall 2025 Final Exam — Worksheet Questions
Quiz
•
12th Grade
47 questions
CSF Final Exam Practice
Quiz
•
9th - 12th Grade
