
Cybersecurity - Assessment Review - SGM #2
Flashcard
•
Information Technology (IT)
•
9th Grade
•
Hard
Wayground Content
FREE Resource
Student preview

19 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Which of the following would pose the greatest threat to a user's personal privacy if it were to be leaked to the public? The IP address of the user’s computer, The user's browser cookies, The user's email address, The user's public key for encryption
Back
The user's public key for encryption
2.
FLASHCARD QUESTION
Front
In the context of password generation, for what does the acronym OTP stand?
Back
One-time password
3.
FLASHCARD QUESTION
Front
In 2017, the credit report company Equifax suffered a data breach that exposed the PII of more than 100 million Americans to attackers. The exposed data included names, home addresses, phone numbers, dates of birth, Social Security numbers, and driver's licence numbers. With access to only that information, which of these actions could not be taken by an attacker? An attacker could sell the Social Security numbers to another attacker on the Internet; An attacker could send an email to an affected person that contained their PII and a threat to reveal them; An attacker could post the home addresses on a public website; An attacker could steal the identity of one of the affected people.
Back
An attacker could send an email to an affected person that contained their PII and a threat to reveal them.
4.
FLASHCARD QUESTION
Front
Which of the following could not occur if your computer is connected to the Internet over a rogue access point?
- The rogue access point could analyze the types of websites you visit
- The rogue access point could modify the contents of your connection to a website
- The rogue access point could see what keywords you're searching for on a web search engine
- The rogue access point could read the files on your device
Back
The rogue access point could read the files on your device
5.
FLASHCARD QUESTION
Front
Why is a computer virus more dangerous than other types of malware?
Back
A virus can make copies of itself, including copying itself into an existing file.
6.
FLASHCARD QUESTION
Front
Dorothy is a network administrator. Her system has been experimenting with an attack that is using bots to send fake requests to the cloud resources her company uses. This is causing disruption of the availabilities of these resources. How is this attack best described?
Back
DDoS
7.
FLASHCARD QUESTION
Front
Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are used? Unauthorized individuals can deny service to a computing system by overwhelming the system with login attempts, Unauthorized individuals can exploit vulnerabilities in compression algorithms to determine a user’s password from their decompressed data, Unauthorized individuals can exploit vulnerabilities in encryption algorithms to determine a user’s password from their encryption key, Unauthorized individuals can use data mining and other techniques to guess a user’s password.
Back
Unauthorized individuals can use data mining and other techniques to guess a user’s password.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?