Log in
Sign up for FREE
arrow_back
Library

AP CSP Cyber Threats - Major Grade

star
star
star
star
star
Last updated 8 months ago
40 questions
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
11
1
1
1
1
1
1
1
1
1
1
Question 1
1.

Question 2
2.

Question 3
3.

Question 4
4.

Question 5
5.

Question 6
6.

Question 7
7.

Question 8
8.

Question 9
9.

Question 10
10.

Question 11
11.

Question 12
12.

Question 13
13.

Differentiate between a computer virus and a worm

Question 14
14.

Question 15
15.

Question 16
16.

Question 17
17.

Question 18
18.

Question 19
19.

Question 20
20.

Question 21
21.

Question 22
22.

Question 23
23.

Question 24
24.

Question 25
25.

Question 26
26.

Question 27
27.

Question 28
28.

Question 29
29.

Why are hackers interested in your data?

Question 30
30.

Each question is 1 points, use this link to answer question 30 -40
Go to this sample web page, click run and answer the following questions:
https://codehs.com/sandbox/benyeogor/social-engineering-page/run

Question 1: What was the first seemingly innocent question asked by Mike Clark that started the information gathering?

Question 31
31.

Question 2: Name two types of personal information that were collected through the social media posts.

Question 32
32.

Question 3: Why might sharing the make and model of your first car be a security risk?

Question 33
33.

Question 4: What was the second personal question Mike Clark asked after gathering information about cars?

Question 34
34.

Question 5: How many users revealed information about both their first car and first pet?

Question 35
35.

Question 6: What specific security feature do attackers target by collecting information about first cars and pets?

Question 36
36.

Question 7: What details did Lisa Rodriguez share that could be used against her and how could it be used against her?

Question 37
37.

Question 8: Why is a social engineer likely to space out their questions rather than asking for multiple pieces of personal information at once?

Question 38
38.

Question 9: What psychological tactic did Mike use to encourage participation in his posts?

Question 39
39.

seQuestion 10: Identify one warning sign that might indicate a post is attempting to gather security information.

Question 40
40.

Question 11: What type of subsequent attack might Mike prepare using the information he collected?

What is the primary goal of social engineering attacks?
a) To exploit technical vulnerabilities in computer systems
b) To trick individuals into revealing confidential information
c) To physically damage computer hardware
d) To encrypt files for data protection
Which of the following is an example of social engineering?
a) A hacker using brute-force attacks to guess a password
b) A computer virus spreading through email attachments
c) A firewall blocking unauthorized access to a network
d) A fake tech support agent calling a victim and asking for their login credentials
Which of the following is the best way to prevent social engineering attacks?
a) Always use strong passwords and never change them
b) Only click on links from trusted sources and verify requests for sensitive information
c) Disable antivirus software to improve system performance
d) Share login credentials with IT support staff regularly
What is the primary purpose of antivirus software?
a) To speed up the computer’s processing power
b) To detect, prevent, and remove malicious software
c) To protect against spam emails
d) To create encrypted backups of files
What is the term for software designed to damage, disrupt, or gain unauthorized access to a computing system?
Malware
Firewall
Open source software
Firmare
Which of the following is not a function of a firewall?
a) Blocking unauthorized network access
b) Preventing malicious software from running
c) Filtering incoming and outgoing network traffic
d) Encrypting stored user data
How does two-factor authentication (2FA) enhance security?
a) It encrypts all user data before sending it online
b) It requires users to provide two different forms of verification before accessing an account
c) It automatically generates strong passwords for users
d) It blocks all suspicious login attempts
What is the main goal of a phishing attack?
a) To block users from accessing their accounts
b) To slow down a website’s loading speed
c) To trick users into revealing sensitive information
d) To delete a user’s personal files
What does a keylogger do?
a) Records every keystroke made by a user to steal passwords and confidential data
b) Prevents unauthorized access to network files
c) Encrypts a user’s keystrokes to prevent cyber threats
d) Protects a computer against viruses
Which type of cyber attack involves an attacker intercepting and modifying data sent over a network?
a) Phishing
b) Brute-force attack
c) Man-in-the-Middle (MITM) attack
d) Trojan Horse attack
Which of the following statements about malicious links is true?
a) They can appear disguised in legitimate-looking websites or emails
b) They are only dangerous if clicked on a mobile device
c) They only appear in spam emails
d) They cannot be detected by cybersecurity tools
A rogue access point is:
a) A secure Wi-Fi connection used in public places
b) A fake wireless access point used to intercept user data
c) A government-run cybersecurity system
d) A router with encrypted security
What is the primary characteristic of a computer virus?
a) It can operate without being attached to any program
b) It cannot replicate itself
c) It attaches itself to a legitimate program and spreads when executed
d) It is always visible to the user
Ransomware is a type of malware that:
a) Locks a user’s data and demands payment for decryption
b) Tracks browsing activity and displays ads
c) Spreads through network connections without user action
d) Hides inside another software program and executes malicious activities
Spyware is primarily used to:
a) Protect a user’s sensitive information
b) Encrypt all network traffic
c) Secretly collect information about a user’s activities
d) Prevent unauthorized users from accessing a computer
What type of malware disguises itself as legitimate software but carries out malicious actions when executed?
a) Worm
b) Trojan Horse
c) Ransomware
d) Firewall
What is a zero-day exploit?
a) A cyber attack that occurs exactly at midnight
b) A security vulnerability that is unknown to developers and exploited before a fix is available
c) A type of malware that spreads within a day
d) A test run of an attack before it is launched
Which type of attack attempts to guess a user’s password by systematically trying every possible combination?
a) Keylogging
b) Brute-force attack
c) Phishing
d) Social engineering
Why is public Wi-Fi considered risky for online transactions?
a) It slows down internet speed
b) It prevents secure data encryption
c) Data sent over public Wi-Fi can be intercepted by attackers
d) It automatically downloads updates that contain malware
Which of the following is not a best practice for protecting against cyber threats?
a) Regularly updating software and security patches
b) Clicking on links in emails from unknown senders
c) Using strong and unique passwords for different accounts
d) Enabling multi-factor authentication
Why are software updates important for cybersecurity?
a) They only add new features and visual improvements
b) They fix security vulnerabilities that attackers could exploit
c) They slow down computers to improve security
d) They remove all existing malware from a system
Which of the following password policies is the most secure?
a) Using the same password across all accounts
b) Using a simple, easy-to-remember password
c) Using a long, complex password with numbers, symbols, and uppercase/lowercase letters
d) Writing passwords on a sticky note next to the computer
Which of the following best defines an open protocol?
a) A proprietary communication standard controlled by a single company
b) A publicly available communication standard that promotes interoperability
c) A security protocol used exclusively for encrypting network traffic
d) A closed-source software tool used for network configuration
Which of the following is NOT an example of an open protocol?
a) HTTP
b) TCP/IP
c) SMTP
d) Microsoft Exchange
Why are open protocols important for the internet?
a) They allow different systems and devices to communicate regardless of manufacturer
b) They restrict access to network communication to increase security
c) They ensure only authorized companies can develop web applications
d) They prevent users from accessing the internet without proper authorization
Which of the following is considered Personally Identifiable Information (PII)?
a) A user's favorite color
b) A device’s IP address
c) A government-issued ID number
d) A website's URL
Which of the following is NOT a best practice for protecting PII?
a) Using strong, unique passwords for online accounts
b) Sharing your Social Security number on social media
c) Enabling two-factor authentication
d) Encrypting sensitive data before storage