CS #32 Hackers & Cyber Attacks

CS #32 Hackers & Cyber Attacks

Assessment

Flashcard

Computers

9th - 12th Grade

Hard

Created by

Quizizz Content

FREE Resource

Student preview

quiz-placeholder

12 questions

Show all answers

1.

FLASHCARD QUESTION

Front

If a hacker has permission to test your computer system's defenses and report on what they find, they are most likely a _________.

Back

White Hat Hacker

2.

FLASHCARD QUESTION

Front

This type of hacker will attempt to steal data or perform unauthorized malicious actions.

Back

Black Hat Hacker

3.

FLASHCARD QUESTION

Front

______ is manipulating an individual into letting attacker in or divulging confidential information.

Back

Social Engineering

4.

FLASHCARD QUESTION

Front

_________ is a type of social engineering that uses emails to try to convince the user to login to an insecure website.

Back

Phishing

5.

FLASHCARD QUESTION

Front

What is a trojan horse?

Back

software that looks good but in reality is malicious

6.

FLASHCARD QUESTION

Front

What is a brute force attack?

Back

an attempt to break a password by repeatedly guessing

7.

FLASHCARD QUESTION

Front

When software writes data beyond its specified range in order to cause undesired or malicious behavior it is using what type of attack?

Back

Buffer Overflow

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?