Search Header Logo
Cybersecurity Flashcard

Cybersecurity Flashcard

Assessment

Flashcard

Computers

9th Grade

Practice Problem

Hard

Created by

Wayground Content

FREE Resource

Student preview

quiz-placeholder

15 questions

Show all answers

1.

FLASHCARD QUESTION

Front

What percentage of the world use one or more social media platforms?

Back

59 percent

2.

FLASHCARD QUESTION

Front

Due to social media becoming an essential marketing tool for modern businesses, using social networks also opens up the threat of

Back

increases a business’s financial risk of social engineering attacks

3.

FLASHCARD QUESTION

Front

How can social media platforms increase a business' attack surface?

Back

By displaying internal information or employee contacts that cybercriminals can use to execute phishing attacks, credential theft, data theft, or other scams.

4.

FLASHCARD QUESTION

Front

What is considered an example of when cybercriminals target social media? Options: Create fake accounts to trick unsuspecting users into providing personal information or attempt to access credentials by persuading users to click links that download malicious content. Create real accounts to trick unsuspecting users into providing personal information or attempt to access credentials by persuading users to click links that download malicious content. Create real accounts to trick unsuspecting users into providing company information or attempt to access credentials by persuading users to click links that upload malicious content. Create fake accounts to trick suspecting users into providing personal information or help safeguard credentials by persuading users to click links that download malicious content.

Back

Create fake accounts to trick unsuspecting users into providing personal information or attempt to access credentials by persuading users to click links that download malicious content.

5.

FLASHCARD QUESTION

Front

What are potential threats of oversharing? Whaling attacks, Spoofing, Spear Phishing attacks, Cyber Security Risk, Spoofing, Spear Phishing attacks, Cybercriminals, Spoofing, Cyber Security, Spear phishing, Online Threats, Whaling attacks

Back

Whaling attacks, Spoofing, Spear Phishing attacks

6.

FLASHCARD QUESTION

Front

What example below represents how social media connections can pose another cybersecurity risk because user engagement exposes relationships useful to cybercriminals attempting fraudulent activity, such as phishing, spoofing, and impersonation? Options: Whaling attacks, Spoofing, Spear Phishing attacks; Likes, shares, comments; Spoofing, shares, impersonation; Comments, likes, Spear phishing attacks

Back

Likes, shares, comments

7.

FLASHCARD QUESTION

Front

Online psychological tests may initially seem harmless, but even those not maliciously designed still collect personal information, such as maiden names and first pet names. Personal preferences are not exempt either, and they're frequently examples of security questions commonly used for password and account recovery. This is an example of ________________________?

Back

Data Aggregation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?