
Unit 8 Cybersecurity Review
Authored by Megan Cullen
Computers
11th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
____________ is a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.
Keylogging
Phishing
Malware
Decryption
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Asymmetric Key Encryption is also known as:
Caesar Cipher
Decryption
Public Key Encryption
Private Key Encryption
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is information about an individual that identifies, links, relates, or describes them?
User History
Cookies
Cache
Personally Identifiable Information
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A
B
C
D
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following best describes a Distributed Denial of Service (DDoS) attack?
An attempt by a country to deny its citizens access to the Internet
An attempt to deny users access to a Web site's resources by flooding the Web site with requests from multiple systems
An attempt by one user to deny service to another user by posting material on a social network
An attempt by a user of the Internet to get private information from a secure database
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A
B
C
D
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A
B
C
D
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?