
CY2U16 Test Review
Authored by CCRE UAH
Computers
9th - 12th Grade
Used 43+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Taking steps to reduce the impact of a cyber attack before it happens is called what?
Cyber Preventative Solutions
Business Continuity Plan
Cyber Mitigation Techniques
Disaster Prevention Plan
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Dividing a network into segments to control the network traffic flowing into an area is what?
Spanning Tree Protocol
Switch Port Protection
Network Segmentation
VLAN
3.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Choose all of the following that are examples of device hardening.
Updating firmware
Disabling Unused Ports
File Integrity Monitoring
Network segmentation
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
In order to check the validity of a website before entering personally identifiable information, you should check for the __________________________.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
___________________ is the process of applying a mathematical computation to a word or words to make a message difficult to read.
Hashing
Digital Signature
Decryption
Certificate of Authority
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is an example of switch port protection?
Netstat
Secure Socket Layer Security
Flood Guard
Digital Signature
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is NOT a primary tool used by hackers to access a network?
Prior-Knowledge
Expertise
Money
Time
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?