
Cyber Midterm Questions
Authored by Brian Hise
others
12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
87 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 2 pts
Which two of the following step of hacking are most likely to involve the use of social engineering? (pick 2)
Recon / footprinting
Gaining Access
Scanning / Probing
Escalating Privileges
Exploiting
2.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
What is the goal of social engineering?
To make people behave better
To help people make more friends
To get an authorized user to give information to an unauthorized person
To have an unauthorized user to determine a user's password using brute force
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A single on/off or 0/1 in a computer's transistor is known as a
bit
byte
nibble
hex
4.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
Scrambling data so that it is unreadable to anyone except those who know the trick to decoding it is...
Cybersecurity
Coding
Cryptography
Hieroglyphics
5.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
The data that has been encrypted is called...
Algorithm
Ciphertext
Plaintext
Code
6.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
This is a method of encryption in when the order of the letters is changed. Scytale cipher, in which a ribbon is wrapped around a cylinder is an example.
Transposition
Substitution
Hieroglyphics
Graphics
7.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
A historic cipher in which the alphabet is shifted left or right a given number of spaces.
Julius Cipher
Caesar Cipher
Vigenere Cipher
Enigma Cipher
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?