Search Header Logo

Ict/cyberterrorism

Authored by Danae Rollon

Computers

KG - Professional Development

Used 26+ times

Ict/cyberterrorism
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

9 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

What is cyberterrorism?

the politically motivated use of computers and information technology to cause severe disruption or widespread fear in society.

The terrorism of cyber platforms.

This is when terrorist like hackers attack online platforms for political and bad reasons etc.

The consistency of hackers combined to for an elite romp of cyber attackers.

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are the different types of hackers?

White hat hacker

Blue hat hacker

Grey hat hacker

Black hat hacker

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between white, grey, and black hat hackers!?

The colors are different.

The white hat hacker is a good hacker who helps the government/company to spot a hack alert, a grey hat hack is good and bad and more than likely works for anyone once they are paid. Finally a black hat hacker is one in which hacks for personal uses and uses hacking at a bad extent.

I don’t know.

The hackers are different because they have different uses.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is cyber warfare?

The use of technology to create An online war for a software platform etc.

War on cyber Platforms

the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.

I don’t know

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of these passwords can be used help protect you from cyber terrorist?

Ru^^?ers@d

Rumpersad1

Password100

R-mP€R$@D00182

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are is the difference between “cyber warfare” and; “cyber terrorism”?

They are the same but there are different names to call it.

They are for two separate purpose.

They are techniques used by different types of organizations, people, etc.

cyber warfare have “certain targets” in a war but cyber terrorism causes fear and harm to anyone in the targeted vicinity.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

which Devices are usually hacked by terrorist?

Phones

Computer

iPads

All of the above!

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?