cyber security

Descripción

quiz on cyber security
Samuel Melendez
Test por Samuel Melendez, actualizado hace más de 1 año
Samuel Melendez
Creado por Samuel Melendez hace casi 9 años
238
5

Resumen del Recurso

Pregunta 1

Pregunta
In what areas does cyber security cause problems for society? Choose the best answer
Respuesta
  • Personally
  • financially,
  • national security
  • all of the above

Pregunta 2

Pregunta
What specific types of crimes have been committed on the internet in the last few years? Choose the best answer
Respuesta
  • Credit card numbers stolen
  • SS numbers stolen
  • Health care records compromised
  • Nuclear centrifuges have been hacked
  • Unmanned aerial drones have been hijacked
  • all of these

Pregunta 3

Pregunta
The army that protects on the internet is referred to as the
Respuesta
  • geek squad
  • Flying aces
  • cyber army
  • green berets

Pregunta 4

Pregunta
What could the enemy do in a cyber war?
Respuesta
  • germ warfare
  • blow up buildings down town
  • kidnap the president
  • Shutdown energy grids

Pregunta 5

Pregunta
What a computer virus?
Respuesta
  • An internet base application
  • An executable program that gets installed and harms the user and the computer.
  • A cancer
  • no such thing

Pregunta 6

Pregunta
How does a virus get on your computer?
Respuesta
  • Radio waves
  • When you plug in new hardware
  • When you install sa program from the interent

Pregunta 7

Pregunta
What can a virus do?
Respuesta
  • slow your metabolism
  • speed up your processor
  • Steal and delete files
  • make you weak

Pregunta 8

Pregunta
What is a distributed denial of service?
Respuesta
  • Hackers overwhelm a website with request from many computers.
  • Hackers distribute a virus to many servers
  • Hackers distribute false rewards
  • Hackers distribute false services to patients

Pregunta 9

Pregunta
What is the purpose of spam email?
Respuesta
  • Advertise a sale
  • encourage people to vote
  • trick people into winning a prize
  • Trick people into sharing sensitive information

Pregunta 10

Pregunta
What is a phishing scam?
Respuesta
  • When hackers send you a series of personal questions pretending to be someone you know.
  • You get what looks like an official email asking you to log into your account. You log into a fake website and the criminals now have your user name and password.
  • When a virus called a phish is installed into you computer.

Pregunta 11

Pregunta
What is one step we can take to secure ourselves?
Respuesta
  • use the same password everywhere
  • use a simple password
  • don't install software you don't trust
  • only install free software

Pregunta 12

Pregunta
Why are software updates important?
Respuesta
  • They help eliminate security bugs
  • They allow producers to advertise
  • They help us accumulate cookies
  • It speeds our processor

Pregunta 13

Pregunta
What is encryption?
Respuesta
  • game code
  • Scrambling or changing a message to hide the original.
  • your password
  • messaging

Pregunta 14

Pregunta
What is decryption?
Respuesta
  • emailing
  • web creation
  • Unscrambling the message to make it readable.
  • coding

Pregunta 15

Pregunta
What was Caesars cipher?
Respuesta
  • italian entree
  • A middle age weapon
  • Each letter in the message is substituted with a letter a certain number down the alphabet.

Pregunta 16

Pregunta
What is the key in an encryption?
Respuesta
  • What allows the receiver the decode the message.
  • What opens a lock to a door
  • the code of the app

Pregunta 17

Pregunta
How large is the key that is used to encrypt a message today?
Respuesta
  • 256 bit key
  • 150 bit key
  • 250 bit key

Pregunta 18

Pregunta
What is symmetric encryption?
Respuesta
  • When the key is always an even number
  • When the key is publicly known
  • When the same key is used to encrypt and decrypt.

Pregunta 19

Pregunta
How do you know when your computer is using public key encryption to protect your information?
Respuesta
  • everybody knows the key
  • The lock or https in the address.
  • the address says lock

Pregunta 20

Pregunta
The Map block at the bottom of the script.....
Respuesta
  • Converts numbers into letters
  • converts letters into numbers
  • converts letters into a sentence

Pregunta 21

Pregunta
The top map block .....
Respuesta
  • converts numbers into letters
  • converts letters into numbers
  • converts text into a list

Pregunta 22

Pregunta
Which block converts the message into a list?
Respuesta
  • map
  • list to sentence
  • split
  • report

Pregunta 23

Pregunta
Considering that this encrypt block shown adds the key what should the decrypt block do?
Respuesta
  • add the key as well
  • divide by the key
  • subtract the key
  • multiply

Pregunta 24

Pregunta
In this script the operation variable must be text
Respuesta
  • True
  • False

Pregunta 25

Pregunta
In this script the operation variable would take all the examples below except....
Respuesta
  • ?+5
  • ?/5
  • (?/5)+5
  • list

Pregunta 26

Pregunta
.The script is missing a block to convert the numbers back to text. which block will do that.
Mostrar resumen completo Ocultar resumen completo

Similar

Network Protocols
Shannon Anderson-Rush
Translations and transformations of functions
Christine Laurich
Introduction to the Internet
Shannon Anderson-Rush
CyberSecurity
Stephen Williamson
Do you know Happy Wheels ?
Apotheose
The Internet Connection Quiz
rhymansaibz11
Computer science quiz
Ryan Barton
AQA Biology B1 Questions
Bella Statham
AQA Biology B2 Questions
Bella Statham
AQA Physics P1 Quiz
Bella Statham
GCSE AQA Biology 1 Quiz
Lilac Potato