Cybersecurity and Global Impacts Review

Cybersecurity and Global Impacts Review

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Ethical Hacking Revision

Ethical Hacking Revision

9th Grade

20 Qs

005_AAA Cyber

005_AAA Cyber

12th Grade - University

20 Qs

CYBERpatriot quiz

CYBERpatriot quiz

9th - 12th Grade

21 Qs

Module 22 - Wireless Networks 3

Module 22 - Wireless Networks 3

9th - 12th Grade

19 Qs

Cryptography

Cryptography

8th - 10th Grade

20 Qs

Ethical, Legal and Social Issues of Computing

Ethical, Legal and Social Issues of Computing

9th - 11th Grade

20 Qs

Caesar Cipher

Caesar Cipher

9th Grade

25 Qs

OCR IT. Unit 3 - Cyber Security. LO2 test:

OCR IT. Unit 3 - Cyber Security. LO2 test:

11th - 12th Grade

20 Qs

Cybersecurity and Global Impacts Review

Cybersecurity and Global Impacts Review

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Jessica Hubal

Used 23+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

____________ is a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.

Keylogging

Phishing

Malware

Decryption

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Asymmetric Key Encryption is also known as:

Caesar Cipher

Decryption

Public Key Encryption

Private Key Encryption

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a DNS spoofing attack?

A hacker sends a forged email asking a user to enter their password or other sensitive information for a given website, then steals the information

A hacker overwrites the data for a given domain name in a DNS server, causing the IP for that domain to point to the hacker’s website rather than the intended website.

A hacker takes control over hundreds or thousands of computers, and sends several requests from those computers to a particular IP address, causing the computer at that IP address to crash.

A hacker gets a victim to install software on their computer, and that software is able to run in the background and send private information back to the hacker.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is information about an individual that identifies, links, relates, or describes them?

User History

Cookies

Cache

Personally Identifiable Information

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

A

B

C

D

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

A

B

C

D

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

A

B

C

D

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?