Log in
Sign up for FREE
arrow_back
Library

AP CSP Cyber Threats - Major Grade

star
star
star
star
star
Last updated 5 months ago
40 questions
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
11
1
1
1
1
1
1
1
1
1
1
Question 1
1.

What is the primary goal of social engineering attacks?

Question 2
2.

Which of the following is an example of social engineering?

Question 3
3.

Which of the following is the best way to prevent social engineering attacks?

Question 4
4.

What is the primary purpose of antivirus software?

Question 5
5.

What is the term for software designed to damage, disrupt, or gain unauthorized access to a computing system?

Question 6
6.

Which of the following is not a function of a firewall?

Question 7
7.

How does two-factor authentication (2FA) enhance security?

Question 8
8.

What is the main goal of a phishing attack?

Question 9
9.

What does a keylogger do?

Question 10
10.

Which type of cyber attack involves an attacker intercepting and modifying data sent over a network?

Question 11
11.

Which of the following statements about malicious links is true?

Question 12
12.

A rogue access point is:

Question 13
13.

Differentiate between a computer virus and a worm

Question 14
14.

What is the primary characteristic of a computer virus?

Question 15
15.

Ransomware is a type of malware that:

Question 16
16.

Spyware is primarily used to:

Question 17
17.

What type of malware disguises itself as legitimate software but carries out malicious actions when executed?

Question 18
18.

What is a zero-day exploit?

Question 19
19.

Which type of attack attempts to guess a user’s password by systematically trying every possible combination?

Question 20
20.

Why is public Wi-Fi considered risky for online transactions?

Question 21
21.

Which of the following is not a best practice for protecting against cyber threats?

Question 22
22.

Why are software updates important for cybersecurity?

Question 23
23.

Which of the following password policies is the most secure?

Question 24
24.

Which of the following best defines an open protocol?

Question 25
25.

Which of the following is NOT an example of an open protocol?

Question 26
26.

Why are open protocols important for the internet?

Question 27
27.

Which of the following is considered Personally Identifiable Information (PII)?

Question 28
28.

Which of the following is NOT a best practice for protecting PII?

Question 29
29.

Why are hackers interested in your data?

Question 30
30.

Each question is 1 points, use this link to answer question 30 -40
Go to this sample web page, click run and answer the following questions:
https://codehs.com/sandbox/benyeogor/social-engineering-page/run

Question 1: What was the first seemingly innocent question asked by Mike Clark that started the information gathering?

Question 31
31.

Question 2: Name two types of personal information that were collected through the social media posts.

Question 32
32.

Question 3: Why might sharing the make and model of your first car be a security risk?

Question 33
33.

Question 4: What was the second personal question Mike Clark asked after gathering information about cars?

Question 34
34.

Question 5: How many users revealed information about both their first car and first pet?

Question 35
35.

Question 6: What specific security feature do attackers target by collecting information about first cars and pets?

Question 36
36.

Question 7: What details did Lisa Rodriguez share that could be used against her and how could it be used against her?

Question 37
37.

Question 8: Why is a social engineer likely to space out their questions rather than asking for multiple pieces of personal information at once?

Question 38
38.

Question 9: What psychological tactic did Mike use to encourage participation in his posts?

Question 39
39.

seQuestion 10: Identify one warning sign that might indicate a post is attempting to gather security information.

Question 40
40.

Question 11: What type of subsequent attack might Mike prepare using the information he collected?