
Cybersecurity
Authored by Jennifer Greger
Computers
9th - 11th Grade
Used 784+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An unskilled person who uses programs developed by others to hack.
Script Kiddie
Hacktivist
Nation-State Hacker
Cybercriminal
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Subversive use of computer systems to promote a political/social agenda.
Script Kiddie
Hactivist
Nation-State Hacker
Cybercriminal
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Government-level hacker seeking to devastate another country's national security or economy.
Script Kiddie
Hacktivist
Nation-State Hacker
Cybercriminal
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Emailing to acquire sensitive information (passwords) by pretending to be a trustworthy entity.
Phishing
Zero-Day Exploit
DDOS
Backdoor
Botnet
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Tricking people into breaking normal security rules and procedures and/or divulging personal information.
Zero-Day Exploit
Botnet
Social Engineering
Backdoor
Phishing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Taking advantage of a software vulnerability on the day it is discovered, before the developers can patch it.
Phishing
Zero-Day Exploit
Botnet
Backdoor
Social Engineering
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An undocumented portal that allows an administrator to enter the system.
Phishing
Zero-Day Exploit
Social Engineering
Backdoor
Botnet
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?