Search Header Logo
DSF - 02 Cybersecurity Threats

DSF - 02 Cybersecurity Threats

Assessment

Presentation

Computers

University

Practice Problem

Easy

Created by

Muhammad Amin

Used 7+ times

FREE Resource

31 Slides • 5 Questions

1

media

2

media

3

media

4

media

5

media

6

media

7

media

8

Multiple Choice

People who perform attacks with the intention of damaging is known as _______.

1

hackers

2

crackers

9

media

10

media

11

Multiple Choice

You become a hacker who expose security issues for the purpose of gaining money. You are called ...

1

White hat hacker

2

Black hat hacker

3

Grey hat hacker

12

Multiple Choice

You have the permission to hack into a system so that improvements can be made in future. You are called ...

1

Black hat hacker

2

Grey hat hacker

3

White hat hacker

13

Multiple Choice

You don't have the permission to hack into a system. However, you managed to trespass the system but you don't leave any harm or damage to the system. You are called ...

1

Black hat hacker

2

Grey hat hacker

3

White hat hacker

14

media

15

media

16

media

17

media

18

media

19

media

20

media

21

media

22

media

23

media

24

media

25

media

26

media

27

media

28

media

29

Open Ended

If you are given a chance to do something bad to a system, what kind of threats would you go for and why?

30

media

31

media

32

media

33

media

34

media

35

media

36

media
media

Show answer

Auto Play

Slide 1 / 36

SLIDE