
2.2.1 Cyber More on Malware
Authored by Robin Robertson
Computers
9th - 12th Grade
Used 67+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
27 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The unethical criminal hacker who breaks laws, steals data, holds information for ransom, and commits other criminal acts.
black-hat hacker
white-hat hacker
gray-hat hacker
hacker
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The ethical cybersecurity expert who has permission to perform security tests and who fully discloses their activities.
black-hat hacker
white-hat hacker
grey-hat hacker
hacker
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This in-between hacker uses illegal and/or unethical means to discover a system’s security vulnerabilities
black-hat hacker
white-hat hacker
gray-hat hacker
hacker
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Uses existing software (scripts) to attack; lacks knowledge to write their own.
script kiddie
insider
hacktivist
cyber syndicate
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Gains access to a system as an employee, student, or other internal person.
script kiddie
insider
hacktivist
warfare/espionage
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Attacks systems to promote social or political change.
script kiddie
insider
hacktivist
cyber syndicate
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Collects in a large group to systematically perform attacks.
insider
hacktivist
cyber syndicate
warfare/espionage
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?