Cybersecurity 2.2.1 - 2.2.3

Quiz
•
Computers
•
10th - 12th Grade
•
Medium
Beverly Ross
Used 26+ times
FREE Resource
19 questions
Show all answers
1.
MATCH QUESTION
1 min • 10 pts
Try to match each type of malware with the correct scenario
Programming Error
Access to system devices, such as printers and network switches, fails frequently. To solve the problem, the comuters operating system must be rebuilt.
Rootkit
A vistor to a website notices a delay in exchanging data with the site and the lock symbol in the address bar looks strange
Ransomware
A software program was not reviewd by a peer nor checked by a quality assurance team before it's release to the public
Man-in-the-middle
While checking a monitor cable, a user notices a strange-looking USB device plugged into the back of their compture
Botnet/DDos
A user's computer boots, but when they try to access their data, it appears garbled and is unreadable.
2.
DRAW QUESTION
3 mins • 10 pts
Diagram what happens in an On-Path Attack

3.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
An ethical cyber expert can expect the following aspects to their career except for
Many rewarding career opportunities
May never get hired anywhere
Lifetime earning
Can provide reliable, stable lifestyle
4.
MATCH QUESTION
1 min • 10 pts
Match the following name of the motivation of a hacker with the correct description
Industrial Espionage
Companies steal information from competitors to elimate the competition.
Social Ideology
With permission from the system owner, authorized hackers find the weaknesses of a system and report their findings.
Financial Gain
Criminals steal money from individuals & corporations
Prevention
Hackers engage in "hactivism" to change aspects of society
Whistleblower
An "insider" exposes injustice that the organization is committing.
5.
OPEN ENDED QUESTION
3 mins • 5 pts
What is the difference between Hardware Keyloggers and Software keyloggers
Evaluate responses using AI:
OFF
6.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
What is latency?
a delay in the transfer of data
an encryption code
a type of crypto-currency
a type of malware
7.
REORDER QUESTION
1 min • 10 pts
Reorder the following steps for using FileZilla
Enter username & Password
On remote site, find file(s) to copy
Enter IP address of remote machine in Host Field
Select files to copy under Local Site
Right-click file & choose "Upload"
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
Cambridge Nationals LO4

Quiz
•
10th Grade
19 questions
AQA GCSE Computer Science - 3.6.1 Security Malicious Code

Quiz
•
8th - 10th Grade
20 questions
Empowerment Technologies Assessment 2

Quiz
•
11th Grade
15 questions
Inside a Computer

Quiz
•
9th - 10th Grade
16 questions
BTEC IT - File types & compression

Quiz
•
10th - 12th Grade
18 questions
Fusion 360: Introduction Quiz

Quiz
•
6th - 12th Grade
15 questions
Network Protocols

Quiz
•
10th Grade
20 questions
Test su informatica di base

Quiz
•
10th Grade
Popular Resources on Wayground
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World

Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
20 questions
ELA Advisory Review

Quiz
•
7th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns

Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade