Log in
Sign up for FREE
arrow_back
Library
AP CSP Cyber Threats - Major Grade
By ANDREW BENYEOGOR
star
star
star
star
star
Share
share
Last updated 5 months ago
40 questions
Add this activity
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
11
1
1
1
1
1
1
1
1
1
1
Question 1
1.
What is the primary goal of social engineering attacks?
a) To exploit technical vulnerabilities in computer systems
b) To trick individuals into revealing confidential information
c) To physically damage computer hardware
d) To encrypt files for data protection
Question 2
2.
Which of the following is an example of social engineering?
a) A hacker using brute-force attacks to guess a password
b) A computer virus spreading through email attachments
c) A firewall blocking unauthorized access to a network
d) A fake tech support agent calling a victim and asking for their login credentials
Question 3
3.
Which of the following is the best way to prevent social engineering attacks?
a) Always use strong passwords and never change them
b) Only click on links from trusted sources and verify requests for sensitive information
c) Disable antivirus software to improve system performance
d) Share login credentials with IT support staff regularly
Question 4
4.
What is the primary purpose of antivirus software?
a) To speed up the computer’s processing power
b) To detect, prevent, and remove malicious software
c) To protect against spam emails
d) To create encrypted backups of files
Question 5
5.
What is the term for software designed to damage, disrupt, or gain unauthorized access to a computing system?
Malware
Firewall
Open source software
Firmare
Question 6
6.
Which of the following is
not
a function of a firewall?
a) Blocking unauthorized network access
b) Preventing malicious software from running
c) Filtering incoming and outgoing network traffic
d) Encrypting stored user data
Question 7
7.
How does
two-factor authentication (2FA)
enhance security?
a) It encrypts all user data before sending it online
b) It requires users to provide two different forms of verification before accessing an account
c) It automatically generates strong passwords for users
d) It blocks all suspicious login attempts
Question 8
8.
What is the
main goal
of a phishing attack?
a) To block users from accessing their accounts
b) To slow down a website’s loading speed
c) To trick users into revealing sensitive information
d) To delete a user’s personal files
Question 9
9.
What does a
keylogger
do?
a) Records every keystroke made by a user to steal passwords and confidential data
b) Prevents unauthorized access to network files
c) Encrypts a user’s keystrokes to prevent cyber threats
d) Protects a computer against viruses
Question 10
10.
Which type of cyber attack involves an attacker
intercepting and modifying
data sent over a network?
a) Phishing
b) Brute-force attack
c) Man-in-the-Middle (MITM) attack
d) Trojan Horse attack
Question 11
11.
Which of the following statements about
malicious links
is true?
a) They can appear disguised in legitimate-looking websites or emails
b) They are only dangerous if clicked on a mobile device
c) They only appear in spam emails
d) They cannot be detected by cybersecurity tools
Question 12
12.
A
rogue access point
is:
a) A secure Wi-Fi connection used in public places
b) A fake wireless access point used to intercept user data
c) A government-run cybersecurity system
d) A router with encrypted security
Question 13
13.
Differentiate between a computer virus and a worm
Question 14
14.
What is the primary characteristic of a
computer virus
?
a) It can operate without being attached to any program
b) It cannot replicate itself
c) It attaches itself to a legitimate program and spreads when executed
d) It is always visible to the user
Question 15
15.
Ransomware
is a type of malware that:
a) Locks a user’s data and demands payment for decryption
b) Tracks browsing activity and displays ads
c) Spreads through network connections without user action
d) Hides inside another software program and executes malicious activities
Question 16
16.
Spyware
is primarily used to:
a) Protect a user’s sensitive information
b) Encrypt all network traffic
c) Secretly collect information about a user’s activities
d) Prevent unauthorized users from accessing a computer
Question 17
17.
What type of malware
disguises itself as legitimate software
but carries out malicious actions when executed?
a) Worm
b) Trojan Horse
c) Ransomware
d) Firewall
Question 18
18.
What is a
zero-day exploit
?
a) A cyber attack that occurs exactly at midnight
b) A security vulnerability that is unknown to developers and exploited before a fix is available
c) A type of malware that spreads within a day
d) A test run of an attack before it is launched
Question 19
19.
Which type of attack
attempts to guess a user’s password
by systematically trying every possible combination?
a) Keylogging
b) Brute-force attack
c) Phishing
d) Social engineering
Question 20
20.
Why is
public Wi-Fi
considered risky for online transactions?
a) It slows down internet speed
b) It prevents secure data encryption
c) Data sent over public Wi-Fi can be intercepted by attackers
d) It automatically downloads updates that contain malware
Question 21
21.
Which of the following is
not
a best practice for protecting against cyber threats?
a) Regularly updating software and security patches
b) Clicking on links in emails from unknown senders
c) Using strong and unique passwords for different accounts
d) Enabling multi-factor authentication
Question 22
22.
Why are software updates important for cybersecurity?
a) They only add new features and visual improvements
b) They fix security vulnerabilities that attackers could exploit
c) They slow down computers to improve security
d) They remove all existing malware from a system
Question 23
23.
Which of the following password policies is the
most secure
?
a) Using the same password across all accounts
b) Using a simple, easy-to-remember password
c) Using a long, complex password with numbers, symbols, and uppercase/lowercase letters
d) Writing passwords on a sticky note next to the computer
Question 24
24.
Which of the following best defines an open protocol?
a) A proprietary communication standard controlled by a single company
b) A publicly available communication standard that promotes interoperability
c) A security protocol used exclusively for encrypting network traffic
d) A closed-source software tool used for network configuration
Question 25
25.
Which of the following is NOT an example of an open protocol?
a) HTTP
b) TCP/IP
c) SMTP
d) Microsoft Exchange
Question 26
26.
Why are open protocols important for the internet?
a) They allow different systems and devices to communicate regardless of manufacturer
b) They restrict access to network communication to increase security
c) They ensure only authorized companies can develop web applications
d) They prevent users from accessing the internet without proper authorization
Question 27
27.
Which of the following is considered Personally Identifiable Information (PII)?
a) A user's favorite color
b) A device’s IP address
c) A government-issued ID number
d) A website's URL
Question 28
28.
Which of the following is NOT a best practice for protecting PII?
a) Using strong, unique passwords for online accounts
b) Sharing your Social Security number on social media
c) Enabling two-factor authentication
d) Encrypting sensitive data before storage
Question 29
29.
Why are hackers interested in your data?
Question 30
30.
Each question is 1 points, use this link to answer question 30 -40
Go to this sample web page, click run and answer the following questions:
https://codehs.com/sandbox/benyeogor/social-engineering-page/run
Question 1: What was the first seemingly innocent question asked by Mike Clark that started the information gathering?
Question 31
31.
Question 2: Name two types of personal information that were collected through the social media posts.
Question 32
32.
Question 3: Why might sharing the make and model of your first car be a security risk?
Question 33
33.
Question 4: What was the second personal question Mike Clark asked after gathering information about cars?
Question 34
34.
Question 5: How many users revealed information about both their first car and first pet?
Question 35
35.
Question 6: What specific security feature do attackers target by collecting information about first cars and pets?
Question 36
36.
Question 7: What details did Lisa Rodriguez share that could be used against her and how could it be used against her?
Question 37
37.
Question 8: Why is a social engineer likely to space out their questions rather than asking for multiple pieces of personal information at once?
Question 38
38.
Question 9: What psychological tactic did Mike use to encourage participation in his posts?
Question 39
39.
seQuestion 10: Identify one warning sign that might indicate a post is attempting to gather security information.
Question 40
40.
Question 11: What type of subsequent attack might Mike prepare using the information he collected?