
Cybersecurity Chapter 1 to 3 summary
Authored by E Sheng Toh
Computers
11th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What name is given to hackers who hack for a cause?
hactivist
white hat
blue hat
hacker
Answer explanation
The term is used to describe gray hackers who rally and protect for a cause.
The correct answer is: hactivist
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?
APT
algorithm
DDoS
exhaustion
Answer explanation
Algorithm attacks can force computers to use memory or overwork the CPU.
The correct answer is: algorithm
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the term BYOD represent?
bring your own device
bring your own disaster
bring your own decision
buy your own disaster
Answer explanation
The term bring-your-own-device is used to describe mobile devices such as iPhones, smartphones, tablets, and other devices,
The correct answer is: bring your own device
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What name is given to a amateur hacker?
blue team
red hat
script kiddie
black hat
Answer explanation
Script kiddies is a term used to describe inexperienced hackers.
The correct answer is: script kiddie
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of an Internet data domain?
Cisco
Palo Alto
Juniper
Answer explanation
A data domain is a repository for data.
The correct answer is: Linkedin
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?
ping sweep
DDoS
DoS
spoof
Answer explanation
DDoS is is an attack that involves multiple systems. DoS involves only a single attack system.
The correct answer is: DDoS
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What service determines which resources a user can access along with the operations that a user can perform?
authorization
authentication
accounting
biometric
Answer explanation
Authorization determines whether a user has certain access privileges.
The correct answer is: authorization
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
25 questions
Chủ đề: Ms powerpoint
Quiz
•
2nd Grade - Professio...
25 questions
Java Review
Quiz
•
9th Grade - University
25 questions
Game & Sim MidTerm Exam 2023
Quiz
•
9th - 12th Grade
30 questions
Lesson 3_Animating Symbols (Adobe Animate)
Quiz
•
9th - 12th Grade
25 questions
EMPOWERMENT TECHNOLOGY
Quiz
•
KG - University
26 questions
Microsoft Word 2016 Advanced Unit
Quiz
•
9th - 12th Grade
25 questions
Introducción a Microsoft OneDrive
Quiz
•
1st - 11th Grade
25 questions
TLJ - KD 3.9 - 4.9 Konsep kerja softswitch berkaitan dengan
Quiz
•
11th Grade
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade