
Cybersecurity Essentials Chapter 1 Review
Authored by Paul Zettler
Computers
10th Grade - University
Used 211+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
This type of hacker steals social security and credit card numbers and resells them to the highest bidder.
White Hat
Black Hat
Gray Hat
Red Hat
2.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
This is the name given to amateur hackers.
Hacktivist
Black Hat
Gray Hat
Script Kiddies
3.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
A person that works for a company finding their vulnerabilities and reports them for fixes before they can be exploited.
White Hat
Black Hat
Gray Hat
Script Kiddies
4.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
A hacker that compromises a network without permission but then discloses the vulnerability without receiving personal gain or causing damage.
White Hat
Black Hat
Gray Hat
Script Kiddies
5.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
A hacker that could be considered white or black hat depending on your perspective, that targets government agencies.
State-Sponsored
Vulnerability Broker
Gray Hat
Script Kiddies
6.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
A hacker that hacks for a specific cause.
Hacktivist
Vulnerability Broker
Gray Hat
White Hat
7.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
This category of threat is actually from current employees authorized to be on the network.
Internal
External
Gray Hat
Black Hat
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?