Search Header Logo

Cybersecurity

Authored by Jennifer Greger

Computers

9th - 11th Grade

Used 784+ times

Cybersecurity
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An unskilled person who uses programs developed by others to hack.

Script Kiddie

Hacktivist

Nation-State Hacker

Cybercriminal

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Subversive use of computer systems to promote a political/social agenda.

Script Kiddie

Hactivist

Nation-State Hacker

Cybercriminal

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Government-level hacker seeking to devastate another country's national security or economy.

Script Kiddie

Hacktivist

Nation-State Hacker

Cybercriminal

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Emailing to acquire sensitive information (passwords) by pretending to be a trustworthy entity.

Phishing

Zero-Day Exploit

DDOS

Backdoor

Botnet

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tricking people into breaking normal security rules and procedures and/or divulging personal information.

Zero-Day Exploit

Botnet

Social Engineering

Backdoor

Phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Taking advantage of a software vulnerability on the day it is discovered, before the developers can patch it.

Phishing

Zero-Day Exploit

Botnet

Backdoor

Social Engineering

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An undocumented portal that allows an administrator to enter the system.

Phishing

Zero-Day Exploit

Social Engineering

Backdoor

Botnet

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?