{- Chapter 1 Cyber Security -}

{- Chapter 1 Cyber Security -}

10th Grade

30 Qs

quiz-placeholder

Similar activities

English Review

English Review

10th Grade

25 Qs

evolve 6 Unit 5

evolve 6 Unit 5

9th - 12th Grade

26 Qs

Principles of Journalism & Watergate

Principles of Journalism & Watergate

10th - 12th Grade

25 Qs

Sub

Sub

8th Grade - University

34 Qs

British vs American English

British vs American English

7th - 12th Grade

26 Qs

Manual Transmissions

Manual Transmissions

9th - 12th Grade

31 Qs

Computer Vocab

Computer Vocab

10th Grade - University

25 Qs

{- Chapter 1 Cyber Security -}

{- Chapter 1 Cyber Security -}

Assessment

Quiz

English

10th Grade

Medium

CCSS
RI.3.5, RI.11-12.8, RL.4.1

+6

Standards-aligned

Created by

Brenton Blackburn

Used 34+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attempt to steal, damage, or destroy data or a computer system

Attack vector

Cyber Security

Cyber attack

Hacking

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a virus?

Malicious software code that is unleashed and attempts to perform its destructive content

Avenue or path the hacker uses to commit the attack

Hacking into a phone system

The act of circumventing or breaking past security boundaries

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True/False : Tor stands for "the onion router"

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The main reason black-hat hackers commit their acts is for what?

Challenge and thrills

Revenge

Hacktivism

Criminal intent

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a script kiddie?

A hacker that is looking to only do good.

Slang term used to describe an individual who uses premade tools to perform their attacks.

Does not cause harm, does not do good.

People that manipulate people to get information that can be used to hack computer systems.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is hacktivism?

The act of spreading malicious software through computer networks.

The act of aiming to target and harm companies or individuals with whom they have a fundamental disagreement.

An attack that is used against a person or company the hacker believes have wronged him in some way or manner.

Attempting to penetrate a network to locate vulnerabilities.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phreaking?

Hacking into a phone system.

Hacking into a network.

The act of circumventing or breaking past security boundaries.

An attempt to steal, damage, or destroy data on a computer system.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?