AP CSP Cyber Threats - Major Grade

Last updated 3 months ago
40 questions
1

What is the primary goal of social engineering attacks?

1

Which of the following is an example of social engineering?

1

Which of the following is the best way to prevent social engineering attacks?

1

What is the primary purpose of antivirus software?

1

What is the term for software designed to damage, disrupt, or gain unauthorized access to a computing system?

1

Which of the following is not a function of a firewall?

1

How does two-factor authentication (2FA) enhance security?

1

What is the main goal of a phishing attack?

1

What does a keylogger do?

1

Which type of cyber attack involves an attacker intercepting and modifying data sent over a network?

1

Which of the following statements about malicious links is true?

1

A rogue access point is:

1

Differentiate between a computer virus and a worm

1

What is the primary characteristic of a computer virus?

1

Ransomware is a type of malware that:

1

Spyware is primarily used to:

1

What type of malware disguises itself as legitimate software but carries out malicious actions when executed?

1

What is a zero-day exploit?

1

Which type of attack attempts to guess a user’s password by systematically trying every possible combination?

1

Why is public Wi-Fi considered risky for online transactions?

1

Which of the following is not a best practice for protecting against cyber threats?

1

Why are software updates important for cybersecurity?

1

Which of the following password policies is the most secure?

1

Which of the following best defines an open protocol?

1

Which of the following is NOT an example of an open protocol?

1

Why are open protocols important for the internet?

1

Which of the following is considered Personally Identifiable Information (PII)?

1

Which of the following is NOT a best practice for protecting PII?

1

Why are hackers interested in your data?

11

Each question is 1 points, use this link to answer question 30 -40
Go to this sample web page, click run and answer the following questions:
https://codehs.com/sandbox/benyeogor/social-engineering-page/run

Question 1: What was the first seemingly innocent question asked by Mike Clark that started the information gathering?

1

Question 2: Name two types of personal information that were collected through the social media posts.

1

Question 3: Why might sharing the make and model of your first car be a security risk?

1

Question 4: What was the second personal question Mike Clark asked after gathering information about cars?

1

Question 5: How many users revealed information about both their first car and first pet?

1

Question 6: What specific security feature do attackers target by collecting information about first cars and pets?

1

Question 7: What details did Lisa Rodriguez share that could be used against her and how could it be used against her?

1

Question 8: Why is a social engineer likely to space out their questions rather than asking for multiple pieces of personal information at once?

1

Question 9: What psychological tactic did Mike use to encourage participation in his posts?

1

seQuestion 10: Identify one warning sign that might indicate a post is attempting to gather security information.

1

Question 11: What type of subsequent attack might Mike prepare using the information he collected?