Hacker quiz

Hacker quiz

9th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

Understanding Potential Risks in Cybersecurity and Prevention Strategies

Understanding Potential Risks in Cybersecurity and Prevention Strategies

9th - 12th Grade

12 Qs

Technical Terms - Internet (A-Z) - Honeypot

Technical Terms - Internet (A-Z) - Honeypot

12th Grade

10 Qs

Unit 1 Online World Exam Revision

Unit 1 Online World Exam Revision

12th Grade

10 Qs

Different categories of Hacking

Different categories of Hacking

10th - 12th Grade

12 Qs

What's the Word?

What's the Word?

11th Grade

10 Qs

Q1-Network Security

Q1-Network Security

10th Grade

12 Qs

Studio - U3 LO1 - 1.1 Cyber Security Aims

Studio - U3 LO1 - 1.1 Cyber Security Aims

12th Grade

10 Qs

Cyber Attacks and Cyber Security Quiz

Cyber Attacks and Cyber Security Quiz

9th Grade

10 Qs

Hacker quiz

Hacker quiz

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Jakub _8b

Used 7+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

White Hat Hackers:

Also known as "ethical hackers"

These are the bad guys who use their skills to gain unauthorized access to systems and networks

they don't have malicious intent, but they don't always obtain permission to hack into systems or networks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Black Hat Hackers:

Also known as "ethical hackers"

These are the bad guys who use their skills to gain unauthorized access to systems and networks

they don't have malicious intent, but they don't always obtain permission to hack into systems or networks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gray Hat Hackers:

Also known as "ethical hackers"

These are the bad guys who use their skills to gain unauthorized access to systems and networks

they don't have malicious intent, but they don't always obtain permission to hack into systems or networks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The term "hacker" originated at:

MIT

MAT

MTI

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Adrian ... was known for hacking into the computer systems of The New York Times and several other organizations

Lame

Lamo

Lema

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gary ... is a British hacker who was accused of hacking into the computer systems of the U.S. military and NASA in the early 2000s:

McKinnon

McKinn

McKennon

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This technique involves manipulating people into divulging sensitive information or performing actions that can be used to gain unauthorized access:

Phishing

Malware

Social Engineering

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious software that is designed to infiltrate or damage a computer system:

Phishing

Malware

Social Engineering