Cybersecurity Flashcard

Cybersecurity Flashcard

Assessment

Flashcard

Computers

9th Grade

Hard

Created by

Wayground Content

FREE Resource

Student preview

quiz-placeholder

15 questions

Show all answers

1.

FLASHCARD QUESTION

Front

What percentage of the world use one or more social media platforms?

Back

59 percent

2.

FLASHCARD QUESTION

Front

Due to social media becoming an essential marketing tool for modern businesses, using social networks also opens up the threat of

Back

increases a business’s financial risk of social engineering attacks

3.

FLASHCARD QUESTION

Front

How can social media platforms increase a business' attack surface?

Back

By displaying internal information or employee contacts that cybercriminals can use to execute phishing attacks, credential theft, data theft, or other scams.

4.

FLASHCARD QUESTION

Front

What is considered an example of when cybercriminals target social media? Options: Create fake accounts to trick unsuspecting users into providing personal information or attempt to access credentials by persuading users to click links that download malicious content. Create real accounts to trick unsuspecting users into providing personal information or attempt to access credentials by persuading users to click links that download malicious content. Create real accounts to trick unsuspecting users into providing company information or attempt to access credentials by persuading users to click links that upload malicious content. Create fake accounts to trick suspecting users into providing personal information or help safeguard credentials by persuading users to click links that download malicious content.

Back

Create fake accounts to trick unsuspecting users into providing personal information or attempt to access credentials by persuading users to click links that download malicious content.

5.

FLASHCARD QUESTION

Front

What are potential threats of oversharing? Whaling attacks, Spoofing, Spear Phishing attacks, Cyber Security Risk, Spoofing, Spear Phishing attacks, Cybercriminals, Spoofing, Cyber Security, Spear phishing, Online Threats, Whaling attacks

Back

Whaling attacks, Spoofing, Spear Phishing attacks

6.

FLASHCARD QUESTION

Front

What example below represents how social media connections can pose another cybersecurity risk because user engagement exposes relationships useful to cybercriminals attempting fraudulent activity, such as phishing, spoofing, and impersonation? Options: Whaling attacks, Spoofing, Spear Phishing attacks; Likes, shares, comments; Spoofing, shares, impersonation; Comments, likes, Spear phishing attacks

Back

Likes, shares, comments

7.

FLASHCARD QUESTION

Front

Online psychological tests may initially seem harmless, but even those not maliciously designed still collect personal information, such as maiden names and first pet names. Personal preferences are not exempt either, and they're frequently examples of security questions commonly used for password and account recovery. This is an example of ________________________?

Back

Data Aggregation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?