Search Header Logo

2.2.1 Cyber More on Malware

Authored by Robin Robertson

Computers

9th - 12th Grade

Used 67+ times

2.2.1 Cyber More on Malware
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

27 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The unethical criminal hacker who breaks laws, steals data, holds information for ransom, and commits other criminal acts.

black-hat hacker

white-hat hacker

gray-hat hacker

hacker

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The ethical cybersecurity expert who has permission to perform security tests and who fully discloses their activities.

black-hat hacker

white-hat hacker

grey-hat hacker

hacker

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This in-between hacker uses illegal and/or unethical means to discover a system’s security vulnerabilities

black-hat hacker

white-hat hacker

gray-hat hacker

hacker

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Uses existing software (scripts) to attack; lacks knowledge to write their own.

script kiddie

insider

hacktivist

cyber syndicate

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gains access to a system as an employee, student, or other internal person.

script kiddie

insider

hacktivist

warfare/espionage

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attacks systems to promote social or political change.

script kiddie

insider

hacktivist

cyber syndicate

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Collects in a large group to systematically perform attacks.

insider

hacktivist

cyber syndicate

warfare/espionage

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?