
Ict/cyberterrorism
Authored by Danae Rollon
Computers
KG - Professional Development
Used 26+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
9 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 1 pt
What is cyberterrorism?
the politically motivated use of computers and information technology to cause severe disruption or widespread fear in society.
The terrorism of cyber platforms.
This is when terrorist like hackers attack online platforms for political and bad reasons etc.
The consistency of hackers combined to for an elite romp of cyber attackers.
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What are the different types of hackers?
White hat hacker
Blue hat hacker
Grey hat hacker
Black hat hacker
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the difference between white, grey, and black hat hackers!?
The colors are different.
The white hat hacker is a good hacker who helps the government/company to spot a hack alert, a grey hat hack is good and bad and more than likely works for anyone once they are paid. Finally a black hat hacker is one in which hacks for personal uses and uses hacking at a bad extent.
I don’t know.
The hackers are different because they have different uses.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is cyber warfare?
The use of technology to create An online war for a software platform etc.
War on cyber Platforms
the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
I don’t know
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of these passwords can be used help protect you from cyber terrorist?
Ru^^?ers@d
Rumpersad1
Password100
R-mP€R$@D00182
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are is the difference between “cyber warfare” and; “cyber terrorism”?
They are the same but there are different names to call it.
They are for two separate purpose.
They are techniques used by different types of organizations, people, etc.
cyber warfare have “certain targets” in a war but cyber terrorism causes fear and harm to anyone in the targeted vicinity.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
which Devices are usually hacked by terrorist?
Phones
Computer
iPads
All of the above!
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?