Cybersecurity - Assessment Review - SGM #2
Flashcard
•
Information Technology (IT)
•
9th Grade
•
Hard
Wayground Content
FREE Resource
Student preview

19 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Which of the following would pose the greatest threat to a user's personal privacy if it were to be leaked to the public? The IP address of the user’s computer, The user's browser cookies, The user's email address, The user's public key for encryption
Back
The user's public key for encryption
2.
FLASHCARD QUESTION
Front
In the context of password generation, for what does the acronym OTP stand?
Back
One-time password
3.
FLASHCARD QUESTION
Front
In 2017, the credit report company Equifax suffered a data breach that exposed the PII of more than 100 million Americans to attackers. The exposed data included names, home addresses, phone numbers, dates of birth, Social Security numbers, and driver's licence numbers. With access to only that information, which of these actions could not be taken by an attacker? An attacker could sell the Social Security numbers to another attacker on the Internet; An attacker could send an email to an affected person that contained their PII and a threat to reveal them; An attacker could post the home addresses on a public website; An attacker could steal the identity of one of the affected people.
Back
An attacker could send an email to an affected person that contained their PII and a threat to reveal them.
4.
FLASHCARD QUESTION
Front
Which of the following could not occur if your computer is connected to the Internet over a rogue access point?
- The rogue access point could analyze the types of websites you visit
- The rogue access point could modify the contents of your connection to a website
- The rogue access point could see what keywords you're searching for on a web search engine
- The rogue access point could read the files on your device
Back
The rogue access point could read the files on your device
5.
FLASHCARD QUESTION
Front
Why is a computer virus more dangerous than other types of malware?
Back
A virus can make copies of itself, including copying itself into an existing file.
6.
FLASHCARD QUESTION
Front
Dorothy is a network administrator. Her system has been experimenting with an attack that is using bots to send fake requests to the cloud resources her company uses. This is causing disruption of the availabilities of these resources. How is this attack best described?
Back
DDoS
7.
FLASHCARD QUESTION
Front
Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are used? Unauthorized individuals can deny service to a computing system by overwhelming the system with login attempts, Unauthorized individuals can exploit vulnerabilities in compression algorithms to determine a user’s password from their decompressed data, Unauthorized individuals can exploit vulnerabilities in encryption algorithms to determine a user’s password from their encryption key, Unauthorized individuals can use data mining and other techniques to guess a user’s password.
Back
Unauthorized individuals can use data mining and other techniques to guess a user’s password.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
19 questions
PIT- Review Week 4-14-17-2025
Flashcard
•
10th Grade
10 questions
Fundamentals of Computer Science: Unit 1 Review
Flashcard
•
8th Grade
14 questions
CodeHS: Unit6 - JavaScript Basics
Flashcard
•
9th Grade
15 questions
Innovative Wheelchair Designs and Uses
Flashcard
•
8th Grade
15 questions
Loops Python
Flashcard
•
9th Grade
18 questions
1.1.2 CSE Algorithms and Coding Fundamentals
Flashcard
•
9th Grade
10 questions
Unity Game Making
Flashcard
•
10th Grade
15 questions
Abstraction & Decomposition
Flashcard
•
8th Grade
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
Discover more resources for Information Technology (IT)
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
20 questions
Distribute and Combine Like Terms
Quiz
•
7th - 9th Grade
12 questions
Graphing Inequalities on a Number Line
Quiz
•
9th Grade
11 questions
NFL Football logos
Quiz
•
KG - Professional Dev...
20 questions
Cell Organelles
Quiz
•
9th Grade
20 questions
Cell Transport
Quiz
•
9th Grade