cyber security

Description

quiz on cyber security
Samuel Melendez
Quiz by Samuel Melendez, updated more than 1 year ago
Samuel Melendez
Created by Samuel Melendez over 8 years ago
232
5

Resource summary

Question 1

Question
In what areas does cyber security cause problems for society? Choose the best answer
Answer
  • Personally
  • financially,
  • national security
  • all of the above

Question 2

Question
What specific types of crimes have been committed on the internet in the last few years? Choose the best answer
Answer
  • Credit card numbers stolen
  • SS numbers stolen
  • Health care records compromised
  • Nuclear centrifuges have been hacked
  • Unmanned aerial drones have been hijacked
  • all of these

Question 3

Question
The army that protects on the internet is referred to as the
Answer
  • geek squad
  • Flying aces
  • cyber army
  • green berets

Question 4

Question
What could the enemy do in a cyber war?
Answer
  • germ warfare
  • blow up buildings down town
  • kidnap the president
  • Shutdown energy grids

Question 5

Question
What a computer virus?
Answer
  • An internet base application
  • An executable program that gets installed and harms the user and the computer.
  • A cancer
  • no such thing

Question 6

Question
How does a virus get on your computer?
Answer
  • Radio waves
  • When you plug in new hardware
  • When you install sa program from the interent

Question 7

Question
What can a virus do?
Answer
  • slow your metabolism
  • speed up your processor
  • Steal and delete files
  • make you weak

Question 8

Question
What is a distributed denial of service?
Answer
  • Hackers overwhelm a website with request from many computers.
  • Hackers distribute a virus to many servers
  • Hackers distribute false rewards
  • Hackers distribute false services to patients

Question 9

Question
What is the purpose of spam email?
Answer
  • Advertise a sale
  • encourage people to vote
  • trick people into winning a prize
  • Trick people into sharing sensitive information

Question 10

Question
What is a phishing scam?
Answer
  • When hackers send you a series of personal questions pretending to be someone you know.
  • You get what looks like an official email asking you to log into your account. You log into a fake website and the criminals now have your user name and password.
  • When a virus called a phish is installed into you computer.

Question 11

Question
What is one step we can take to secure ourselves?
Answer
  • use the same password everywhere
  • use a simple password
  • don't install software you don't trust
  • only install free software

Question 12

Question
Why are software updates important?
Answer
  • They help eliminate security bugs
  • They allow producers to advertise
  • They help us accumulate cookies
  • It speeds our processor

Question 13

Question
What is encryption?
Answer
  • game code
  • Scrambling or changing a message to hide the original.
  • your password
  • messaging

Question 14

Question
What is decryption?
Answer
  • emailing
  • web creation
  • Unscrambling the message to make it readable.
  • coding

Question 15

Question
What was Caesars cipher?
Answer
  • italian entree
  • A middle age weapon
  • Each letter in the message is substituted with a letter a certain number down the alphabet.

Question 16

Question
What is the key in an encryption?
Answer
  • What allows the receiver the decode the message.
  • What opens a lock to a door
  • the code of the app

Question 17

Question
How large is the key that is used to encrypt a message today?
Answer
  • 256 bit key
  • 150 bit key
  • 250 bit key

Question 18

Question
What is symmetric encryption?
Answer
  • When the key is always an even number
  • When the key is publicly known
  • When the same key is used to encrypt and decrypt.

Question 19

Question
How do you know when your computer is using public key encryption to protect your information?
Answer
  • everybody knows the key
  • The lock or https in the address.
  • the address says lock

Question 20

Question
The Map block at the bottom of the script.....
Answer
  • Converts numbers into letters
  • converts letters into numbers
  • converts letters into a sentence

Question 21

Question
The top map block .....
Answer
  • converts numbers into letters
  • converts letters into numbers
  • converts text into a list

Question 22

Question
Which block converts the message into a list?
Answer
  • map
  • list to sentence
  • split
  • report

Question 23

Question
Considering that this encrypt block shown adds the key what should the decrypt block do?
Answer
  • add the key as well
  • divide by the key
  • subtract the key
  • multiply

Question 24

Question
In this script the operation variable must be text
Answer
  • True
  • False

Question 25

Question
In this script the operation variable would take all the examples below except....
Answer
  • ?+5
  • ?/5
  • (?/5)+5
  • list

Question 26

Question
.The script is missing a block to convert the numbers back to text. which block will do that.
Show full summary Hide full summary

Similar

Network Protocols
Shannon Anderson-Rush
Translations and transformations of functions
Christine Laurich
Introduction to the Internet
Shannon Anderson-Rush
CyberSecurity
Stephen Williamson
Do you know Happy Wheels ?
Apotheose
The Internet Connection Quiz
rhymansaibz11
Computer science quiz
Ryan Barton
AQA Biology B1 Questions
Bella Statham
AQA Biology B2 Questions
Bella Statham
AQA Physics P1 Quiz
Bella Statham
GCSE AQA Biology 1 Quiz
Lilac Potato