Search Header Logo
CS #32 Hackers & Cyber Attacks

CS #32 Hackers & Cyber Attacks

Assessment

Flashcard

Computers

9th - 12th Grade

Practice Problem

Hard

Created by

Wayground Content

FREE Resource

Student preview

quiz-placeholder

12 questions

Show all answers

1.

FLASHCARD QUESTION

Front

If a hacker has permission to test your computer system's defenses and report on what they find, they are most likely a _________.

Back

White Hat Hacker

2.

FLASHCARD QUESTION

Front

This type of hacker will attempt to steal data or perform unauthorized malicious actions.

Back

Black Hat Hacker

3.

FLASHCARD QUESTION

Front

______ is manipulating an individual into letting attacker in or divulging confidential information.

Back

Social Engineering

4.

FLASHCARD QUESTION

Front

_________ is a type of social engineering that uses emails to try to convince the user to login to an insecure website.

Back

Phishing

5.

FLASHCARD QUESTION

Front

What is a trojan horse?

Back

software that looks good but in reality is malicious

6.

FLASHCARD QUESTION

Front

What is a brute force attack?

Back

an attempt to break a password by repeatedly guessing

7.

FLASHCARD QUESTION

Front

When software writes data beyond its specified range in order to cause undesired or malicious behavior it is using what type of attack?

Back

Buffer Overflow

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?