
Cybersecurity Chapter 1 to 3 summary
Authored by E Sheng Toh
Computers
11th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What name is given to hackers who hack for a cause?
hactivist
white hat
blue hat
hacker
Answer explanation
The term is used to describe gray hackers who rally and protect for a cause.
The correct answer is: hactivist
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?
APT
algorithm
DDoS
exhaustion
Answer explanation
Algorithm attacks can force computers to use memory or overwork the CPU.
The correct answer is: algorithm
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the term BYOD represent?
bring your own device
bring your own disaster
bring your own decision
buy your own disaster
Answer explanation
The term bring-your-own-device is used to describe mobile devices such as iPhones, smartphones, tablets, and other devices,
The correct answer is: bring your own device
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What name is given to a amateur hacker?
blue team
red hat
script kiddie
black hat
Answer explanation
Script kiddies is a term used to describe inexperienced hackers.
The correct answer is: script kiddie
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of an Internet data domain?
Cisco
Palo Alto
Juniper
Answer explanation
A data domain is a repository for data.
The correct answer is: Linkedin
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?
ping sweep
DDoS
DoS
spoof
Answer explanation
DDoS is is an attack that involves multiple systems. DoS involves only a single attack system.
The correct answer is: DDoS
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What service determines which resources a user can access along with the operations that a user can perform?
authorization
authentication
accounting
biometric
Answer explanation
Authorization determines whether a user has certain access privileges.
The correct answer is: authorization
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
35 questions
EmTech Q1 Reviewer
Quiz
•
11th Grade
25 questions
Python Test
Quiz
•
9th - 12th Grade
25 questions
TRẮC NGHIỆM TIN 4 BÀI 2: GÕ PHÍM ĐÚNG CÁCH
Quiz
•
5th Grade - University
25 questions
Creación de Tablas en MS Word
Quiz
•
10th - 12th Grade
25 questions
Evaluación Correo Electrónico
Quiz
•
9th - 12th Grade
25 questions
CSS Quiz 1
Quiz
•
11th Grade
25 questions
informatika 11/1
Quiz
•
11th Grade
28 questions
4QICT12 - Current and Future Trends of Media and Information
Quiz
•
11th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
22 questions
El Imperfecto
Quiz
•
9th - 12th Grade
15 questions
ACT Reading Practice
Quiz
•
11th Grade
20 questions
SSS/SAS
Quiz
•
9th - 12th Grade
20 questions
verbos reflexivos en español
Quiz
•
9th - 12th Grade
14 questions
Making Inferences From Samples
Quiz
•
7th - 12th Grade
23 questions
CCG - CH8 Polygon angles and area Review
Quiz
•
9th - 12th Grade
8 questions
Momentum and Collisions
Lesson
•
9th - 12th Grade