Cybersecurity 2.2.1 - 2.2.3
Quiz
•
Computers
•
10th - 12th Grade
•
Practice Problem
•
Medium
Beverly Ross
Used 26+ times
FREE Resource
Enhance your content in a minute
19 questions
Show all answers
1.
MATCH QUESTION
1 min • 10 pts
Try to match each type of malware with the correct scenario
Programming Error
A software program was not reviewd by a peer nor checked by a quality assurance team before it's release to the public
Rootkit
A user's computer boots, but when they try to access their data, it appears garbled and is unreadable.
Man-in-the-middle
While checking a monitor cable, a user notices a strange-looking USB device plugged into the back of their compture
Ransomware
Access to system devices, such as printers and network switches, fails frequently. To solve the problem, the comuters operating system must be rebuilt.
Botnet/DDos
A vistor to a website notices a delay in exchanging data with the site and the lock symbol in the address bar looks strange
2.
DRAW QUESTION
3 mins • 10 pts
Diagram what happens in an On-Path Attack

3.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
An ethical cyber expert can expect the following aspects to their career except for
Many rewarding career opportunities
May never get hired anywhere
Lifetime earning
Can provide reliable, stable lifestyle
4.
MATCH QUESTION
1 min • 10 pts
Match the following name of the motivation of a hacker with the correct description
Financial Gain
Hackers engage in "hactivism" to change aspects of society
Industrial Espionage
With permission from the system owner, authorized hackers find the weaknesses of a system and report their findings.
Prevention
Criminals steal money from individuals & corporations
Social Ideology
Companies steal information from competitors to elimate the competition.
Whistleblower
An "insider" exposes injustice that the organization is committing.
5.
OPEN ENDED QUESTION
3 mins • 5 pts
What is the difference between Hardware Keyloggers and Software keyloggers
Evaluate responses using AI:
OFF
6.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
What is latency?
a delay in the transfer of data
an encryption code
a type of crypto-currency
a type of malware
7.
REORDER QUESTION
1 min • 10 pts
Reorder the following steps for using FileZilla
On remote site, find file(s) to copy
Select files to copy under Local Site
Right-click file & choose "Upload"
Enter IP address of remote machine in Host Field
Enter username & Password
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
22 questions
Text and Image representation
Quiz
•
11th Grade
17 questions
Warstwa transportowa
Quiz
•
12th Grade
20 questions
TO PAT AIJ
Quiz
•
11th Grade
17 questions
Operating System
Quiz
•
12th Grade
20 questions
quizz tkinter
Quiz
•
11th Grade - University
15 questions
Shared Data & Disaster Recovery
Quiz
•
11th Grade
20 questions
Latihan Jaringan Dasar PSAS
Quiz
•
10th Grade
14 questions
Input, output and storage de
Quiz
•
8th Grade - Professio...
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
