Search Header Logo
Cybercrime

Cybercrime

Assessment

Presentation

Computers

9th Grade

Medium

Created by

Luca Longo

Used 13+ times

FREE Resource

12 Slides • 11 Questions

1

media

Cybercrime

by Luca Longo

2

Multiple Choice

A hacker that uses illegal and/or unethical means to discover a system’s security vulnerabilities. Typically, this type of hacker accesses systems illegally—without permission—but then share their findings and report problems they find is a

1

A.

Unauthorized 

Hacker

2

B.

Authorized Hacker

3

C.

In between

4

D.

client

3

​A is incorrect: because an Unauthorized Hacker is an unethical criminal hacker who breaks laws, steals data, holds information for ransom, and commits other criminal acts

​C is correct: because an In between is a hacker uses illegal and/or unethical means to discover a system’s security vulnerabilities

​D is incorrect: because a client is a desktop computer or workstation that is capable of obtaining information and applications from a server.

​B is incorrect: because an Authorized Hacker is an ethical cybersecurity expert who has permission to perform security tests and who fully discloses their activities

4

Multiple Choice

a desktop computer or workstation that is capable of obtaining information and applications from a server

1

A.

Unauthorized 

Hacker

2

B.

Authorized Hacker

3

C.

In between

4

D.

client

5

​A is incorrect: because an Unauthorized Hacker is an unethical criminal hacker who breaks laws, steals data, holds information for ransom, and commits other criminal acts

​B is incorrect: because an Authorized Hacker is an ethical cybersecurity expert who has permission to perform security tests and who fully discloses their activities

​C is incorrect: because an In between is a hacker uses illegal and/or unethical means to discover a system’s security vulnerabilities

​D is correct: because a client is a desktop computer or workstation that is capable of obtaining information and applications from a server..

6

Multiple Choice

an unethical criminal hacker who breaks laws, steals data, holds information for ransom, and commits other criminal acts, is a?

1

A.

Unauthorized 

Hacker

2

B.

In between

3

c.

client

4

D.

Authorized

Hacker

7

​A is correct: because an Unauthorized Hacker is an unethical criminal hacker who breaks laws, steals data, holds information for ransom, and commits other criminal acts

​B is incorrect: because an In between is a hacker uses illegal and/or unethical means to discover a system’s security vulnerabilities

​C is incorrect: because a client is a desktop computer or workstation that is capable of obtaining information and applications from a server.

​D is incorrect: because an Authorized Hacker is an ethical cybersecurity expert who has permission to perform security tests and who fully discloses their activities

8

Multiple Choice

an ethical cybersecurity expert who has permission to perform security tests and who fully discloses their activities. They report vulnerabilities and improve the security of a system. Their behavior is noble and their actions align with society’s greater good

1

A.

Unauthorized 

Hacker

2

B.

Authorized Hacker

3

C.

In between

4

D.

client

9

​A is incorrect: because an Unauthorized Hacker is an unethical criminal hacker who breaks laws, steals data, holds information for ransom, and commits other criminal acts

​B is correct: because an Authorized Hacker is an ethical cybersecurity expert who has permission to perform security tests and who fully discloses their activities

​C is incorrect: because an In between is a hacker uses illegal and/or unethical means to discover a system’s security vulnerabilities

​D is incorrect: because a client is a desktop computer or workstation that is capable of obtaining information and applications from a server..

10

Multiple Choice

a relatively unskilled individual who uses scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites, according to the programming and hacking cultures

1

A.

hacktivism

2

B.

script kiddie

3

C.

Insider

4

D.

cyber syndicate

11

​A is incorrect: because a hacktivism is a person who gains unauthorized access to computer files or networks in order to further social or political ends.

​B is correct: because a script kiddie is a relatively unskilled individual who uses scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites, according to the programming and hacking cultures

​C is incorrect: because a Insider is a member of any group of people of limited number and generally restricted access

​D is incorrect: because a cyber syndicate is an organized criminal groups who use spam, spyware and malware, and other types of cyber tools to engage in criminal conduct

12

Multiple Choice

an organized criminal groups who use spam, spyware and malware, and other types of cyber tools to engage in criminal conduct

1

A.

hacktivism

2

B.

script kiddie

3

C.

Insider

4

D.

cyber syndicate

13

​​A is incorrect: because a hacktivism is a person who gains unauthorized access to computer files or networks in order to further social or political ends.

​B is incorrect: because a script kiddie is a relatively unskilled individual who uses scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites, according to the programming and hacking cultures

​C is incorrect: because a Insider is a member of any group of people of limited number and generally restricted access

​D is correct: because a cyber syndicate is an organized criminal groups who use spam, spyware and malware, and other types of cyber tools to engage in criminal conduct

14

Multiple Choice

a person who gains unauthorized access to computer files or networks in order to further social or political ends

1

A.

hacktivism

2

B.

script kiddie

3

C.

Insider

4

D.

cyber syndicate

15

​​A is correct: because a hacktivism is a person who gains unauthorized access to computer files or networks in order to further social or political ends.

​B is incorrect: because a script kiddie is a relatively unskilled individual who uses scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites, according to the programming and hacking cultures

​C is incorrect: because a Insider is a member of any group of people of limited number and generally restricted access

​D is incorrect: because a cyber syndicate is an organized criminal groups who use spam, spyware and malware, and other types of cyber tools to engage in criminal conduct

16

Multiple Choice

a member of any group of people of limited number and generally restricted access

1

A.

hacktivism

2

B.

script kiddie

3

C.

Insider

4

D.

cyber syndicate

17

​​A is incorrect: because a hacktivism is a person who gains unauthorized access to computer files or networks in order to further social or political ends.

​B is incorrect: because a script kiddie is a relatively unskilled individual who uses scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites, according to the programming and hacking cultures

​C is correct: because a Insider is a member of any group of people of limited number and generally restricted access

​D is incorrect: because a cyber syndicate is an organized criminal groups who use spam, spyware and malware, and other types of cyber tools to engage in criminal conduct

18

Multiple Select

the career of an Authorized Hacker is

1

Can provide reliable, stable lifestyle

2

May never get 

hired anywhere

3

Many rewarding career 

opportunities

4

Lifetime of 

earning

5

Jobs are worldwide, free to live 

anywhere

19

​The career of an Authorized Hacker is

​Can provide reliable, stable lifestyle

​Many rewarding career opportunities

​Lifetime of earning

​Jobs are worldwide, free to live anywhere

​The career of an Unauthorized Hacker is

May never get hired anywhere

Causes dangerous, unstable lifestyle

Unpredictable opportunities and rewards

Fugitive from the law, possible jail time

20

Multiple Choice

the practice of spying or using spies to obtain information about the plans and activities especially of a foreign government or a competing company

1

A.

hacktivism

2

B.

warfare/espionage

3

C.

Insider

4

D.

cyber syndicate

21

​​A is incorrect: because a hacktivism is a person who gains unauthorized access to computer files or networks in order to further social or political ends.

​B is correct: because a warfare/espionage is the practice of spying or using spies to obtain information about the plans and activities especially of a foreign government or a competing company

​C is correct: because a Insider is a member of any group of people of limited number and generally restricted access

​D is incorrect: because a cyber syndicate is an organized criminal groups who use spam, spyware and malware, and other types of cyber tools to engage in criminal conduct

22

Multiple Select

the career of an Unauthorized Hacker is

1

Causes dangerous, unstable lifestyle

2

May never get 

hired anywhere

3

Lifetime of 

earning

4

Unpredictable opportunities and rewards

5

Fugitive from the law, possible jail time

23

​The career of an Authorized Hacker is

​Can provide reliable, stable lifestyle

​Many rewarding career opportunities

​Lifetime of earning

​Jobs are worldwide, free to live anywhere

​The career of an Unauthorized Hacker is

May never get hired anywhere

Causes dangerous, unstable lifestyle

Unpredictable opportunities and rewards

Fugitive from the law, possible jail time

media

Cybercrime

by Luca Longo

Show answer

Auto Play

Slide 1 / 23

SLIDE