Share/Like This Page
Print Instructions

NOTE: Only your test content will print.
To preview this test, click on the File menu and select Print Preview.

See our guide on How To Change Browser Print Settings to customize headers and footers before printing.

Internet Security (Grades 11-12)

Print Test (Only the test content will print)
Name: Date:

Internet Security

The only way to get a virus on your computer is by opening an attachment to an unfamiliar email.
  1. True
  2. False
One of the top methods of stealing a person's identity is by stealing mail from a person's mailbox.
  1. True
  2. False
Estonia is the country the United States is most worried about launching a cyber war.
  1. True
  2. False
You should maintain a separate phone and fax line for your business.
  1. True
  2. False
What happens during a denial of service attack?
  1. A virus destroys data.
  2. A website cannot handle all the requests.
  3. It embeds code in programs to gain access later.
  4. A user is able to obtain information from another computer.
"Security by Design" refers to
  1. the study of computer security design.
  2. software that is designed with security as the main feature.
  3. hardware that is designed with security as the main feature.
  4. computers that are secure because they are blocked from public access.
How old was Mafiaboy when he committed his first computer crime?
  1. 15
  2. 12
  3. 10
  4. 6
What was Mafiaboy's real name?
  1. Michael Calcium
  2. Monroe Calce
  3. Monroe Calcium
  4. Michael Calce
When someone pretends to be someone or something they are not to acquire your passwords, credit card, or bank information (or any personal info) it is known as
  1. Phishing.
  2. Skimming.
  3. Dumpster Diving.
  4. Pumping and Dumping.
Use of both Internet and building to run or do business is known as which of the following?
  1. e-commerce
  2. bricks-and-mortar
  3. clicks-and-bricks
  4. multi-channel retailer
Which of the following are vulnerable to a cyber attack? Select all that apply.
  1. Personal Computers
  2. Mac Computers
  3. Cell Phones
  4. Televisions
An cyber attack where communication is sent from an unknown source pretending to be a known source is known as
  1. tampering.
  2. spoofing.
  3. direct-access.
  4. privilege escalation.
The type of attack in which the hacker pretends to be someone or something else (an executive, a bank or even a customer in order to gain access to passwords or financial information is known as
  1. spoofing.
  2. phishing.
  3. click jacking.
  4. social engineering.
The Internet of Things could be the reason cyber attacks become physical as well as virtual. Explain what the Internet of Things is and why this is true. Provide on example to support your explanation. T

Who most often attacks government and military computer systems?

The reason that corporations are most often hacked is?

List the three types of processes used to combat cyber security threats.

You need to be a member to access free printables.
Already a member? Log in for access.    |    Go Back To Previous Page