cyber security

Description

quiz on cyber security
Samuel Melendez
Quiz by Samuel Melendez, updated more than 1 year ago
Samuel Melendez
Created by Samuel Melendez over 8 years ago
234
5

Resource summary

Question 1

Question
In what areas does cyber security cause problems for society? Choose the best answer
Answer
  • Personally
  • financially,
  • national security
  • all of the above

Question 2

Question
What specific types of crimes have been committed on the internet in the last few years? Choose the best answer
Answer
  • Credit card numbers stolen
  • SS numbers stolen
  • Health care records compromised
  • Nuclear centrifuges have been hacked
  • Unmanned aerial drones have been hijacked
  • all of these

Question 3

Question
The army that protects on the internet is referred to as the
Answer
  • geek squad
  • Flying aces
  • cyber army
  • green berets

Question 4

Question
What could the enemy do in a cyber war?
Answer
  • germ warfare
  • blow up buildings down town
  • kidnap the president
  • Shutdown energy grids

Question 5

Question
What a computer virus?
Answer
  • An internet base application
  • An executable program that gets installed and harms the user and the computer.
  • A cancer
  • no such thing

Question 6

Question
How does a virus get on your computer?
Answer
  • Radio waves
  • When you plug in new hardware
  • When you install sa program from the interent

Question 7

Question
What can a virus do?
Answer
  • slow your metabolism
  • speed up your processor
  • Steal and delete files
  • make you weak

Question 8

Question
What is a distributed denial of service?
Answer
  • Hackers overwhelm a website with request from many computers.
  • Hackers distribute a virus to many servers
  • Hackers distribute false rewards
  • Hackers distribute false services to patients

Question 9

Question
What is the purpose of spam email?
Answer
  • Advertise a sale
  • encourage people to vote
  • trick people into winning a prize
  • Trick people into sharing sensitive information

Question 10

Question
What is a phishing scam?
Answer
  • When hackers send you a series of personal questions pretending to be someone you know.
  • You get what looks like an official email asking you to log into your account. You log into a fake website and the criminals now have your user name and password.
  • When a virus called a phish is installed into you computer.

Question 11

Question
What is one step we can take to secure ourselves?
Answer
  • use the same password everywhere
  • use a simple password
  • don't install software you don't trust
  • only install free software

Question 12

Question
Why are software updates important?
Answer
  • They help eliminate security bugs
  • They allow producers to advertise
  • They help us accumulate cookies
  • It speeds our processor

Question 13

Question
What is encryption?
Answer
  • game code
  • Scrambling or changing a message to hide the original.
  • your password
  • messaging

Question 14

Question
What is decryption?
Answer
  • emailing
  • web creation
  • Unscrambling the message to make it readable.
  • coding

Question 15

Question
What was Caesars cipher?
Answer
  • italian entree
  • A middle age weapon
  • Each letter in the message is substituted with a letter a certain number down the alphabet.

Question 16

Question
What is the key in an encryption?
Answer
  • What allows the receiver the decode the message.
  • What opens a lock to a door
  • the code of the app

Question 17

Question
How large is the key that is used to encrypt a message today?
Answer
  • 256 bit key
  • 150 bit key
  • 250 bit key

Question 18

Question
What is symmetric encryption?
Answer
  • When the key is always an even number
  • When the key is publicly known
  • When the same key is used to encrypt and decrypt.

Question 19

Question
How do you know when your computer is using public key encryption to protect your information?
Answer
  • everybody knows the key
  • The lock or https in the address.
  • the address says lock

Question 20

Question
The Map block at the bottom of the script.....
Answer
  • Converts numbers into letters
  • converts letters into numbers
  • converts letters into a sentence

Question 21

Question
The top map block .....
Answer
  • converts numbers into letters
  • converts letters into numbers
  • converts text into a list

Question 22

Question
Which block converts the message into a list?
Answer
  • map
  • list to sentence
  • split
  • report

Question 23

Question
Considering that this encrypt block shown adds the key what should the decrypt block do?
Answer
  • add the key as well
  • divide by the key
  • subtract the key
  • multiply

Question 24

Question
In this script the operation variable must be text
Answer
  • True
  • False

Question 25

Question
In this script the operation variable would take all the examples below except....
Answer
  • ?+5
  • ?/5
  • (?/5)+5
  • list

Question 26

Question
.The script is missing a block to convert the numbers back to text. which block will do that.
Show full summary Hide full summary

Similar

Network Protocols
Shannon Anderson-Rush
Translations and transformations of functions
Christine Laurich
Introduction to the Internet
Shannon Anderson-Rush
CyberSecurity
Stephen Williamson
Do you know Happy Wheels ?
Apotheose
The Internet Connection Quiz
rhymansaibz11
AQA Biology B1 Questions
Bella Statham
AQA Biology B2 Questions
Bella Statham
AQA Physics P1 Quiz
Bella Statham
GCSE AQA Biology 1 Quiz
Lilac Potato
AQA GCSE Product Design Questions
Bella Statham