
Threats, Issues, and Defenses - Ch 5
Authored by Cari Cline
Computers
10th Grade - University
Used 308+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A _______ recovery plan is a written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster.
emergency
backup
recovery
disaster
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A ______ has advanced computer and networks skills and a goal of destroying data or stealing information.
hacker
cracker
cyberextortionist
script kiddie
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A ______ refers to someone who accesses a computer or network illegally.
hacker
cracker
cyberterrorist
script kiddie
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A ______ refers to someone who demands payment to stop an attack on an organization's technology infrastructure.
hacker
cracker
cyberextortionist
script kiddie
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A ______ has the intent of destroying data and stealing information and uses prewritten hacking and cracking programs due to not having the skills independently.
hacker
cracker
cyberextortionist
script kiddie
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_______ is someone who uses the Internet or network to destroy or damage computers for political reasons.
hacker
cracker
cyberterrorist
cyberextortionist
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The term _____ was once a complimentary work for a computer enthusiast.
hacker
cracker
cyberterrorist
script kiddie
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?