Ict/cyberterrorism

Ict/cyberterrorism

KG - Professional Development

9 Qs

quiz-placeholder

Similar activities

cybersecurity_1

cybersecurity_1

12th Grade

14 Qs

Hackers and Viruses

Hackers and Viruses

1st Grade

10 Qs

CSE_Chap1

CSE_Chap1

University

10 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Different categories of Hacking

Different categories of Hacking

10th - 12th Grade

12 Qs

Hacking

Hacking

10th Grade

13 Qs

Cybersecurity

Cybersecurity

12th Grade

10 Qs

hacking

hacking

University

10 Qs

Ict/cyberterrorism

Ict/cyberterrorism

Assessment

Quiz

Computers

KG - Professional Development

Hard

Created by

Danae Rollon

Used 26+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

What is cyberterrorism?

the politically motivated use of computers and information technology to cause severe disruption or widespread fear in society.

The terrorism of cyber platforms.

This is when terrorist like hackers attack online platforms for political and bad reasons etc.

The consistency of hackers combined to for an elite romp of cyber attackers.

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are the different types of hackers?

White hat hacker

Blue hat hacker

Grey hat hacker

Black hat hacker

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between white, grey, and black hat hackers!?

The colors are different.

The white hat hacker is a good hacker who helps the government/company to spot a hack alert, a grey hat hack is good and bad and more than likely works for anyone once they are paid. Finally a black hat hacker is one in which hacks for personal uses and uses hacking at a bad extent.

I don’t know.

The hackers are different because they have different uses.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is cyber warfare?

The use of technology to create An online war for a software platform etc.

War on cyber Platforms

the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.

I don’t know

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of these passwords can be used help protect you from cyber terrorist?

Ru^^?ers@d

Rumpersad1

Password100

R-mP€R$@D00182

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are is the difference between “cyber warfare” and; “cyber terrorism”?

They are the same but there are different names to call it.

They are for two separate purpose.

They are techniques used by different types of organizations, people, etc.

cyber warfare have “certain targets” in a war but cyber terrorism causes fear and harm to anyone in the targeted vicinity.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

which Devices are usually hacked by terrorist?

Phones

Computer

iPads

All of the above!

8.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

How can you prevent cyber terrorism?

Use a full-service internet security suite.

Use strong passwords.

Manage your social media settings.

Keep your software updated.

Stop talking your personal information and Your families information.

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Do you think is worst, cyber terrorism or cyber warfare.

Cyber terrorism

Cyber warfare

They are both good actually.

They are equally bad.