Search Header Logo

AP CSP - Cybersecurity and Encryption Concepts Vocab

Authored by Wayground Content

Computers

9th - 12th Grade

Used 2+ times

AP CSP - Cybersecurity and Encryption Concepts Vocab
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Keylogging

A type of malware that records every keystroke made by a user to steal sensitive information.

A software that enhances keyboard performance and speed.

A security feature that prevents unauthorized access to a computer.

A tool used for monitoring network traffic and performance.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware

Malicious software designed to harm or exploit computers and systems.

A type of hardware used for data storage.

A software that enhances computer performance.

A program that protects against viruses.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Asymmetric Encryption

An encryption method using two keys—a public key for encryption and a private key for decryption.

An encryption method that uses a single key for both encryption and decryption.

A method of encryption that relies on symmetric keys only.

An encryption technique that does not require any keys.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption

The process of encoding data to prevent unauthorized access.

A method of compressing data to save space.

A technique for improving data retrieval speed.

A way to delete data permanently.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DDoS (Distributed Denial of Service) Attack

A cyber attack that floods a website or network with excessive traffic, making it unavailable.

A method to enhance website performance by distributing traffic.

A security protocol to protect against unauthorized access.

A type of malware that infects computers to steal data.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Public Key Encryption

A symmetric encryption technique using the same key for encryption and decryption.

An asymmetric encryption technique using different keys for encryption and decryption.

A method of encrypting data using a single key for both encryption and decryption.

A technique that uses multiple keys for a single encryption process.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Creative Commons

A type of copyright that restricts sharing and remixing.

An alternative to copyright that allows people to declare how they want their artistic creations to be shared or remixed.

A legal term for public domain works.

A licensing agreement for commercial use of art.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?