AP CSP Unit 8 Vocab- Cybersecurity and Global Impacts

AP CSP Unit 8 Vocab- Cybersecurity and Global Impacts

9th Grade

13 Qs

quiz-placeholder

Similar activities

Elicitación de requisitos de software, metodología de desarrollo

Elicitación de requisitos de software, metodología de desarrollo

1st Grade - University

18 Qs

Internet Service Providers

Internet Service Providers

9th - 12th Grade

14 Qs

Latihan Soal Informatika

Latihan Soal Informatika

8th Grade - University

17 Qs

PRETEST KODING DAN KA

PRETEST KODING DAN KA

5th Grade - University

10 Qs

Algoritma ve Akış Diyagramları

Algoritma ve Akış Diyagramları

9th Grade

15 Qs

EXCEL

EXCEL

9th - 12th Grade

10 Qs

Conociendo La placa Base

Conociendo La placa Base

9th Grade

10 Qs

Configurazione di base di un router

Configurazione di base di un router

9th Grade

15 Qs

AP CSP Unit 8 Vocab- Cybersecurity and Global Impacts

AP CSP Unit 8 Vocab- Cybersecurity and Global Impacts

Assessment

Quiz

Information Technology (IT)

9th Grade

Practice Problem

Easy

Created by

Eric York

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Personally Identifiable Information (PPI) refer to?

A software development process

A method of encrypting data

A type of computer virus

Information that identifies, links, relates, or describes an individual

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a technique that attempts to trick a user into providing personal information?

Phishing

Keylogging

Decryption

Malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is keylogging?

Scanning software for viruses

A method of multi-factor authentication

Encrypting messages to keep them secret

Recording every keystroke made by a computer user

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

Software intended to damage a computing system

A type of encryption

A method of data protection

A wireless access point

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a rogue access point?

A wireless access point that gives unauthorized access to secure networks

A secure method of data encryption

A type of computer virus

A legitimate network access point

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is decryption?

A computer virus scanning software

A process that reverses encryption

A method of encrypting data

A type of malware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is encryption?

A computer virus

A process of encoding messages to keep them secret

A method of decrypting data

A type of phishing attack

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?