cyber security

Descripción

quiz on cyber security
Samuel Melendez
Test por Samuel Melendez, actualizado hace más de 1 año
Samuel Melendez
Creado por Samuel Melendez hace alrededor de 8 años
211
5

Resumen del Recurso

Pregunta 1

Pregunta
In what areas does cyber security cause problems for society? Choose the best answer
Respuesta
  • Personally
  • financially,
  • national security
  • all of the above

Pregunta 2

Pregunta
What specific types of crimes have been committed on the internet in the last few years? Choose the best answer
Respuesta
  • Credit card numbers stolen
  • SS numbers stolen
  • Health care records compromised
  • Nuclear centrifuges have been hacked
  • Unmanned aerial drones have been hijacked
  • all of these

Pregunta 3

Pregunta
The army that protects on the internet is referred to as the
Respuesta
  • geek squad
  • Flying aces
  • cyber army
  • green berets

Pregunta 4

Pregunta
What could the enemy do in a cyber war?
Respuesta
  • germ warfare
  • blow up buildings down town
  • kidnap the president
  • Shutdown energy grids

Pregunta 5

Pregunta
What a computer virus?
Respuesta
  • An internet base application
  • An executable program that gets installed and harms the user and the computer.
  • A cancer
  • no such thing

Pregunta 6

Pregunta
How does a virus get on your computer?
Respuesta
  • Radio waves
  • When you plug in new hardware
  • When you install sa program from the interent

Pregunta 7

Pregunta
What can a virus do?
Respuesta
  • slow your metabolism
  • speed up your processor
  • Steal and delete files
  • make you weak

Pregunta 8

Pregunta
What is a distributed denial of service?
Respuesta
  • Hackers overwhelm a website with request from many computers.
  • Hackers distribute a virus to many servers
  • Hackers distribute false rewards
  • Hackers distribute false services to patients

Pregunta 9

Pregunta
What is the purpose of spam email?
Respuesta
  • Advertise a sale
  • encourage people to vote
  • trick people into winning a prize
  • Trick people into sharing sensitive information

Pregunta 10

Pregunta
What is a phishing scam?
Respuesta
  • When hackers send you a series of personal questions pretending to be someone you know.
  • You get what looks like an official email asking you to log into your account. You log into a fake website and the criminals now have your user name and password.
  • When a virus called a phish is installed into you computer.

Pregunta 11

Pregunta
What is one step we can take to secure ourselves?
Respuesta
  • use the same password everywhere
  • use a simple password
  • don't install software you don't trust
  • only install free software

Pregunta 12

Pregunta
Why are software updates important?
Respuesta
  • They help eliminate security bugs
  • They allow producers to advertise
  • They help us accumulate cookies
  • It speeds our processor

Pregunta 13

Pregunta
What is encryption?
Respuesta
  • game code
  • Scrambling or changing a message to hide the original.
  • your password
  • messaging

Pregunta 14

Pregunta
What is decryption?
Respuesta
  • emailing
  • web creation
  • Unscrambling the message to make it readable.
  • coding

Pregunta 15

Pregunta
What was Caesars cipher?
Respuesta
  • italian entree
  • A middle age weapon
  • Each letter in the message is substituted with a letter a certain number down the alphabet.

Pregunta 16

Pregunta
What is the key in an encryption?
Respuesta
  • What allows the receiver the decode the message.
  • What opens a lock to a door
  • the code of the app

Pregunta 17

Pregunta
How large is the key that is used to encrypt a message today?
Respuesta
  • 256 bit key
  • 150 bit key
  • 250 bit key

Pregunta 18

Pregunta
What is symmetric encryption?
Respuesta
  • When the key is always an even number
  • When the key is publicly known
  • When the same key is used to encrypt and decrypt.

Pregunta 19

Pregunta
How do you know when your computer is using public key encryption to protect your information?
Respuesta
  • everybody knows the key
  • The lock or https in the address.
  • the address says lock

Pregunta 20

Pregunta
The Map block at the bottom of the script.....
Respuesta
  • Converts numbers into letters
  • converts letters into numbers
  • converts letters into a sentence

Pregunta 21

Pregunta
The top map block .....
Respuesta
  • converts numbers into letters
  • converts letters into numbers
  • converts text into a list

Pregunta 22

Pregunta
Which block converts the message into a list?
Respuesta
  • map
  • list to sentence
  • split
  • report

Pregunta 23

Pregunta
Considering that this encrypt block shown adds the key what should the decrypt block do?
Respuesta
  • add the key as well
  • divide by the key
  • subtract the key
  • multiply

Pregunta 24

Pregunta
In this script the operation variable must be text
Respuesta
  • True
  • False

Pregunta 25

Pregunta
In this script the operation variable would take all the examples below except....
Respuesta
  • ?+5
  • ?/5
  • (?/5)+5
  • list

Pregunta 26

Pregunta
.The script is missing a block to convert the numbers back to text. which block will do that.
Mostrar resumen completo Ocultar resumen completo

Similar

Network Protocols
Shannon Anderson-Rush
Translations and transformations of functions
Christine Laurich
Introduction to the Internet
Shannon Anderson-Rush
CyberSecurity
Stephen Williamson
Do you know Happy Wheels ?
Apotheose
The Internet Connection Quiz
rhymansaibz11
AQA Biology B1 Questions
Bella Statham
AQA Biology B2 Questions
Bella Statham
AQA Physics P1 Quiz
Bella Statham
GCSE AQA Biology 1 Quiz
Lilac Potato
AQA GCSE Product Design Questions
Bella Statham