What is the primary technique used in phishing?
APCSP IOC-2.C Cybersecurity Threats

Quiz
•
Computers
•
9th - 12th Grade
•
Easy

Beckie Lee
Used 4+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Installing software to record keystrokes.
Setting up unauthorized wireless networks.
Tricking a user into providing personal information.
Intercepting data sent over public networks.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The personal information obtained through phishing is subsequently used for what purpose?
To improve the user's online experience.
To perform security updates on the user's system.
To gain fraudulent access to passwords and confidential information via keystroke recording.
To access sensitive online resources like bank accounts and emails.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does keylogging software function to obtain confidential information?
By tricking users into clicking disguised malicious links.
By recording every keystroke made by the computer user.
By creating a fake wireless access point to intercept data.
By sending unsolicited emails with malicious attachments.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What specific risk is highlighted concerning data sent over public networks?
Data automatically gets deleted after transmission.
Data transmission speed significantly decreases.
Data can be intercepted, analyzed, and modified.
Data requires multifactor authentication for viewing.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the defining characteristic of a 'rogue access point'?
It is any free Wi-Fi hotspot available in public areas.
It is a wireless access point providing unauthorized access to secure networks.
It is a program designed to record user keystrokes.
It is an email designed to trick users into revealing passwords.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user connects their laptop to an unfamiliar Wi-Fi network named 'Free_Airport_WiFi' that appears legitimate but was set up by an attacker. This scenario directly involves which specific threat mentioned in the standards?
Keylogging
Phishing
Rogue access point
Untrustworthy freeware download
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Where can malicious links be disguised?
Only within computer hardware components.
Only in system security logs.
On a web page or in an email message.
Exclusively within paid software applications.
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
G10 IGCSE ICT Security of Data

Quiz
•
9th - 10th Grade
15 questions
14.5.2 - Quiz on Social Engineering Attacks

Quiz
•
10th Grade
20 questions
Cyber Security

Quiz
•
8th - 12th Grade
10 questions
SHS_Empowerment Technologies_MELC#2_QUIZ2

Quiz
•
11th - 12th Grade
12 questions
AP CSP Unit 8 Review

Quiz
•
11th Grade
15 questions
Big Data & Cyber

Quiz
•
9th - 12th Grade
10 questions
Unit 10 AP CSP Advanced

Quiz
•
9th - 12th Grade
20 questions
Cambridge Nationals LO4

Quiz
•
10th Grade
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade
Discover more resources for Computers
25 questions
Spanish preterite verbs (irregular/changed)

Quiz
•
9th - 10th Grade
10 questions
Identify Slope and y-intercept (from equation)

Quiz
•
8th - 9th Grade
10 questions
Juneteenth: History and Significance

Interactive video
•
7th - 12th Grade
8 questions
"Keeping the City of Venice Afloat" - STAAR Bootcamp, Day 1

Quiz
•
9th - 12th Grade
26 questions
June 19th

Quiz
•
4th - 9th Grade
20 questions
Distance, Midpoint, and Slope

Quiz
•
10th Grade
20 questions
Figurative Language Review

Quiz
•
10th Grade
27 questions
STAAR English 1 Review

Quiz
•
9th Grade