Search Header Logo

CK Cyber 2 - LO1.2.C

Authored by Kari Cobb

Information Technology (IT)

10th Grade

Used 1+ times

CK Cyber 2 - LO1.2.C
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a cybersecurity threat?

A harmless software update

A potential disruption, harm, or loss to a computer system, computer network, or associated data

A routine maintenance task

A new software feature

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes social engineering?

A method to improve network speed

An attempt by an adversary to manipulate a human target to divulge confidential information

A technique to encrypt data

A way to design secure software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is eavesdropping in the context of cybersecurity?

Listening to music online

Gaining access to digital information and recording or copying the data

Watching a live video stream

Reading a public blog

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In an on-path attack, also known as a Man-in-the-Middle attack, what does the adversary do?

Sends spam emails

Interrupts a data stream between two parties and alters the data

Installs antivirus software

Creates a backup of data

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of social engineering?

To improve user interface design

To manipulate a human target to divulge confidential information

To develop new software applications

To enhance network security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a characteristic of an on-path attack?

The adversary captures data between two parties

Both parties are aware of the adversary's presence

The adversary alters the data before sending it on

Both parties think they are communicating directly with each other

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between eavesdropping and an on-path attack?

Eavesdropping involves altering data, while on-path attacks do not

Eavesdropping is passive, while on-path attacks involve data alteration

Eavesdropping is more secure than on-path attacks

Eavesdropping requires physical access to the network

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?