10.2 Cybersecurity

10.2 Cybersecurity

9th - 12th Grade

14 Qs

quiz-placeholder

Similar activities

Bots and Botnets

Bots and Botnets

10th - 12th Grade

10 Qs

Cyber Security and Social Engineering

Cyber Security and Social Engineering

9th - 11th Grade

18 Qs

Cisco CCST Objective 1

Cisco CCST Objective 1

12th Grade

10 Qs

J808 LO4.1.4 Hacking, 5 DDOS, 6 Pharming

J808 LO4.1.4 Hacking, 5 DDOS, 6 Pharming

10th - 11th Grade

15 Qs

Upaya Pengamanan Password

Upaya Pengamanan Password

11th Grade

10 Qs

Cyber Security

Cyber Security

12th Grade

10 Qs

ENCRYPTION AND CYBERCRIME

ENCRYPTION AND CYBERCRIME

7th - 10th Grade

15 Qs

Recap on Malware

Recap on Malware

12th Grade

13 Qs

10.2 Cybersecurity

10.2 Cybersecurity

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Kelly odell

Used 26+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attempt to connect to a server by capturing and resending authentication information.

Email Attack

Browser Attack

Man-in-the-Middle Attack

Replay Attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.

Pretexting

Email Attack

Browser Attack

Man-in-the-Middle Attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Convincing a victim that they are performing a legitimate task within their web browser window when, in fact, they are being tricked into revealing sensitive information or installing malware on their computer.

Social Engineering

Reconnaissance

Pretexting

Browser Attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Exploiting a victim using email messages.

Social Engineering

Reconnaissance

Pretexting

Email Attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tricking a victim into revealing sensitive information under false pretenses.

Snooping

Wiretapping

Reconnaissance

Pretexting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The passive gathering of information about a potential victim.

Social Engineering

Reconnaissance

Pretexting

Email Attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The use of deception to gain personal and/or private information for unlawful purposes.

Impersonation

Denial of Service

Malware

Social Engineering

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?