Cyber Security: Hackers

Cyber Security: Hackers

3rd Grade

7 Qs

quiz-placeholder

Similar activities

PBD SK T5 - 1.1 Komputer dan Impak

PBD SK T5 - 1.1 Komputer dan Impak

1st Grade - Professional Development

7 Qs

Defensive Design

Defensive Design

KG - University

11 Qs

Among us youtubers

Among us youtubers

KG - Professional Development

10 Qs

UPOLOGISTES

UPOLOGISTES

1st Grade - Professional Development

11 Qs

Hackers - Los intelectuales

Hackers - Los intelectuales

1st - 3rd Grade

5 Qs

Streitschlichter

Streitschlichter

3rd Grade

6 Qs

Cyber Security - S2 Knowledge Check

Cyber Security - S2 Knowledge Check

3rd - 12th Grade

6 Qs

Python - 01

Python - 01

1st - 5th Grade

11 Qs

Cyber Security: Hackers

Cyber Security: Hackers

Assessment

Quiz

Computers

3rd Grade

Medium

Created by

Adrianna Dar

Used 8+ times

FREE Resource

7 questions

Show all answers

1.

MATCH QUESTION

1 min • 1 pt

Match the following

Social Engineer

These are malicious hackers who engage in illegal activities.

Hacktivist

These hackers use psychological manipulation to deceive individuals or gain unauthorized access.

Black Hat

These are ethical hackers who work to improve security.

White Hat

These hackers use their skills to promote political or social causes.

Grey Hat

These hackers fall between white hat and black hat hackers.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of hacker rely on human interaction rather than technical exploits?

White Hat

Gtey Hat

Hacktivist

Social Engineer

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Social Engineers use impersonation and try to trick people into revealing

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Black Hat Hackers can engage in tasks such as:

unauthorised access to systems

stealing sensitive information

launching cyber attacks

testing system's vulnerabilities

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Grey Hat Hackers may engage in the following tasks:

exposing security flaws

testing system vulnerabilities

stealing personal data for financial use

blackmailing the organisation to control it

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

White Hat Hacker may engage in the following tasks:

testing system vulnerabilities

conducting security audits

identify weaknesses in a system

provide recommendations to enhance the security

7.

DRAG AND DROP QUESTION

1 min • 1 pt

​ (a)   tasks involve defacing websites, leaking ​ (b)   information, or ​ (c)   online services to draw ​ (d)   to their cause.

Hacktivist
sensitive
disrupting
attention