cyber security

Beschreibung

quiz on cyber security
Samuel Melendez
Quiz von Samuel Melendez, aktualisiert more than 1 year ago
Samuel Melendez
Erstellt von Samuel Melendez vor mehr als 8 Jahre
228
5

Zusammenfassung der Ressource

Frage 1

Frage
In what areas does cyber security cause problems for society? Choose the best answer
Antworten
  • Personally
  • financially,
  • national security
  • all of the above

Frage 2

Frage
What specific types of crimes have been committed on the internet in the last few years? Choose the best answer
Antworten
  • Credit card numbers stolen
  • SS numbers stolen
  • Health care records compromised
  • Nuclear centrifuges have been hacked
  • Unmanned aerial drones have been hijacked
  • all of these

Frage 3

Frage
The army that protects on the internet is referred to as the
Antworten
  • geek squad
  • Flying aces
  • cyber army
  • green berets

Frage 4

Frage
What could the enemy do in a cyber war?
Antworten
  • germ warfare
  • blow up buildings down town
  • kidnap the president
  • Shutdown energy grids

Frage 5

Frage
What a computer virus?
Antworten
  • An internet base application
  • An executable program that gets installed and harms the user and the computer.
  • A cancer
  • no such thing

Frage 6

Frage
How does a virus get on your computer?
Antworten
  • Radio waves
  • When you plug in new hardware
  • When you install sa program from the interent

Frage 7

Frage
What can a virus do?
Antworten
  • slow your metabolism
  • speed up your processor
  • Steal and delete files
  • make you weak

Frage 8

Frage
What is a distributed denial of service?
Antworten
  • Hackers overwhelm a website with request from many computers.
  • Hackers distribute a virus to many servers
  • Hackers distribute false rewards
  • Hackers distribute false services to patients

Frage 9

Frage
What is the purpose of spam email?
Antworten
  • Advertise a sale
  • encourage people to vote
  • trick people into winning a prize
  • Trick people into sharing sensitive information

Frage 10

Frage
What is a phishing scam?
Antworten
  • When hackers send you a series of personal questions pretending to be someone you know.
  • You get what looks like an official email asking you to log into your account. You log into a fake website and the criminals now have your user name and password.
  • When a virus called a phish is installed into you computer.

Frage 11

Frage
What is one step we can take to secure ourselves?
Antworten
  • use the same password everywhere
  • use a simple password
  • don't install software you don't trust
  • only install free software

Frage 12

Frage
Why are software updates important?
Antworten
  • They help eliminate security bugs
  • They allow producers to advertise
  • They help us accumulate cookies
  • It speeds our processor

Frage 13

Frage
What is encryption?
Antworten
  • game code
  • Scrambling or changing a message to hide the original.
  • your password
  • messaging

Frage 14

Frage
What is decryption?
Antworten
  • emailing
  • web creation
  • Unscrambling the message to make it readable.
  • coding

Frage 15

Frage
What was Caesars cipher?
Antworten
  • italian entree
  • A middle age weapon
  • Each letter in the message is substituted with a letter a certain number down the alphabet.

Frage 16

Frage
What is the key in an encryption?
Antworten
  • What allows the receiver the decode the message.
  • What opens a lock to a door
  • the code of the app

Frage 17

Frage
How large is the key that is used to encrypt a message today?
Antworten
  • 256 bit key
  • 150 bit key
  • 250 bit key

Frage 18

Frage
What is symmetric encryption?
Antworten
  • When the key is always an even number
  • When the key is publicly known
  • When the same key is used to encrypt and decrypt.

Frage 19

Frage
How do you know when your computer is using public key encryption to protect your information?
Antworten
  • everybody knows the key
  • The lock or https in the address.
  • the address says lock

Frage 20

Frage
The Map block at the bottom of the script.....
Antworten
  • Converts numbers into letters
  • converts letters into numbers
  • converts letters into a sentence

Frage 21

Frage
The top map block .....
Antworten
  • converts numbers into letters
  • converts letters into numbers
  • converts text into a list

Frage 22

Frage
Which block converts the message into a list?
Antworten
  • map
  • list to sentence
  • split
  • report

Frage 23

Frage
Considering that this encrypt block shown adds the key what should the decrypt block do?
Antworten
  • add the key as well
  • divide by the key
  • subtract the key
  • multiply

Frage 24

Frage
In this script the operation variable must be text
Antworten
  • True
  • False

Frage 25

Frage
In this script the operation variable would take all the examples below except....
Antworten
  • ?+5
  • ?/5
  • (?/5)+5
  • list

Frage 26

Frage
.The script is missing a block to convert the numbers back to text. which block will do that.
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Network Protocols
Shannon Anderson-Rush
Translations and transformations of functions
Christine Laurich
Introduction to the Internet
Shannon Anderson-Rush
CyberSecurity
Stephen Williamson
Do you know Happy Wheels ?
Apotheose
The Internet Connection Quiz
rhymansaibz11
Computer science quiz
Ryan Barton
CCNA Security 210-260 IINS - Exam 1
Mike M
CCNA Security 210-260 IINS - Exam 2
Mike M
AQA Biology B1 Questions
Bella Statham
AQA Biology B2 Questions
Bella Statham