AP CSP Cyber Threats - Major Grade
star
star
star
star
star
Last updated 3 months ago
40 questions
1
What is the primary goal of social engineering attacks?
What is the primary goal of social engineering attacks?
1
Which of the following is an example of social engineering?
Which of the following is an example of social engineering?
1
Which of the following is the best way to prevent social engineering attacks?
Which of the following is the best way to prevent social engineering attacks?
1
What is the primary purpose of antivirus software?
What is the primary purpose of antivirus software?
1
What is the term for software designed to damage, disrupt, or gain unauthorized access to a computing system?
What is the term for software designed to damage, disrupt, or gain unauthorized access to a computing system?
1
Which of the following is not a function of a firewall?
Which of the following is not a function of a firewall?
1
How does two-factor authentication (2FA) enhance security?
How does two-factor authentication (2FA) enhance security?
1
What is the main goal of a phishing attack?
What is the main goal of a phishing attack?
1
What does a keylogger do?
What does a keylogger do?
1
Which type of cyber attack involves an attacker intercepting and modifying data sent over a network?
Which type of cyber attack involves an attacker intercepting and modifying data sent over a network?
1
Which of the following statements about malicious links is true?
Which of the following statements about malicious links is true?
1
A rogue access point is:
A rogue access point is:
1
Differentiate between a computer virus and a worm
Differentiate between a computer virus and a worm
1
What is the primary characteristic of a computer virus?
What is the primary characteristic of a computer virus?
1
Ransomware is a type of malware that:
Ransomware is a type of malware that:
1
Spyware is primarily used to:
Spyware is primarily used to:
1
What type of malware disguises itself as legitimate software but carries out malicious actions when executed?
What type of malware disguises itself as legitimate software but carries out malicious actions when executed?
1
What is a zero-day exploit?
What is a zero-day exploit?
1
Which type of attack attempts to guess a user’s password by systematically trying every possible combination?
Which type of attack attempts to guess a user’s password by systematically trying every possible combination?
1
Why is public Wi-Fi considered risky for online transactions?
Why is public Wi-Fi considered risky for online transactions?
1
Which of the following is not a best practice for protecting against cyber threats?
Which of the following is not a best practice for protecting against cyber threats?
1
Why are software updates important for cybersecurity?
Why are software updates important for cybersecurity?
1
Which of the following password policies is the most secure?
Which of the following password policies is the most secure?
1
Which of the following best defines an open protocol?
Which of the following best defines an open protocol?
1
Which of the following is NOT an example of an open protocol?
Which of the following is NOT an example of an open protocol?
1
Why are open protocols important for the internet?
Why are open protocols important for the internet?
1
Which of the following is considered Personally Identifiable Information (PII)?
Which of the following is considered Personally Identifiable Information (PII)?
1
Which of the following is NOT a best practice for protecting PII?
Which of the following is NOT a best practice for protecting PII?
1
Why are hackers interested in your data?
Why are hackers interested in your data?
11
Each question is 1 points, use this link to answer question 30 -40Go to this sample web page, click run and answer the following questions:https://codehs.com/sandbox/benyeogor/social-engineering-page/run
Question 1: What was the first seemingly innocent question asked by Mike Clark that started the information gathering?
Each question is 1 points, use this link to answer question 30 -40
Go to this sample web page, click run and answer the following questions:
https://codehs.com/sandbox/benyeogor/social-engineering-page/run
Question 1: What was the first seemingly innocent question asked by Mike Clark that started the information gathering?
1
Question 2: Name two types of personal information that were collected through the social media posts.
Question 2: Name two types of personal information that were collected through the social media posts.
1
Question 3: Why might sharing the make and model of your first car be a security risk?
Question 3: Why might sharing the make and model of your first car be a security risk?
1
Question 4: What was the second personal question Mike Clark asked after gathering information about cars?
Question 4: What was the second personal question Mike Clark asked after gathering information about cars?
1
Question 5: How many users revealed information about both their first car and first pet?
Question 5: How many users revealed information about both their first car and first pet?
1
Question 6: What specific security feature do attackers target by collecting information about first cars and pets?
Question 6: What specific security feature do attackers target by collecting information about first cars and pets?
1
Question 7: What details did Lisa Rodriguez share that could be used against her and how could it be used against her?
Question 7: What details did Lisa Rodriguez share that could be used against her and how could it be used against her?
1
Question 8: Why is a social engineer likely to space out their questions rather than asking for multiple pieces of personal information at once?
Question 8: Why is a social engineer likely to space out their questions rather than asking for multiple pieces of personal information at once?
1
Question 9: What psychological tactic did Mike use to encourage participation in his posts?
Question 9: What psychological tactic did Mike use to encourage participation in his posts?
1
seQuestion 10: Identify one warning sign that might indicate a post is attempting to gather security information.
seQuestion 10: Identify one warning sign that might indicate a post is attempting to gather security information.
1
Question 11: What type of subsequent attack might Mike prepare using the information he collected?
Question 11: What type of subsequent attack might Mike prepare using the information he collected?