Cyber Security: Hackers

Cyber Security: Hackers

3rd Grade

7 Qs

quiz-placeholder

Similar activities

Data Representation 2: Part 2

Data Representation 2: Part 2

2nd - 5th Grade

10 Qs

For the Fortnite kids

For the Fortnite kids

KG - University

7 Qs

Software vulnerabilities

Software vulnerabilities

1st - 3rd Grade

12 Qs

Computer Security Basics

Computer Security Basics

3rd Grade

9 Qs

A COMPUTER SYSTEM

A COMPUTER SYSTEM

3rd Grade

12 Qs

More about scratch

More about scratch

3rd - 6th Grade

10 Qs

ROBLOX

ROBLOX

KG - Professional Development

10 Qs

Web/System Exploitation

Web/System Exploitation

1st Grade - Professional Development

9 Qs

Cyber Security: Hackers

Cyber Security: Hackers

Assessment

Quiz

Computers

3rd Grade

Medium

Created by

Adrianna Dar

Used 8+ times

FREE Resource

7 questions

Show all answers

1.

MATCH QUESTION

1 min • 1 pt

Match the following

Grey Hat

These hackers fall between white hat and black hat hackers.

Social Engineer

These hackers use their skills to promote political or social causes.

Hacktivist

These hackers use psychological manipulation to deceive individuals or gain unauthorized access.

Black Hat

These are malicious hackers who engage in illegal activities.

White Hat

These are ethical hackers who work to improve security.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of hacker rely on human interaction rather than technical exploits?

White Hat

Gtey Hat

Hacktivist

Social Engineer

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Social Engineers use impersonation and try to trick people into revealing

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Black Hat Hackers can engage in tasks such as:

unauthorised access to systems

stealing sensitive information

launching cyber attacks

testing system's vulnerabilities

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Grey Hat Hackers may engage in the following tasks:

exposing security flaws

testing system vulnerabilities

stealing personal data for financial use

blackmailing the organisation to control it

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

White Hat Hacker may engage in the following tasks:

testing system vulnerabilities

conducting security audits

identify weaknesses in a system

provide recommendations to enhance the security

7.

DRAG AND DROP QUESTION

1 min • 1 pt

​ (a)   tasks involve defacing websites, leaking ​ (b)   information, or ​ (c)   online services to draw ​ (d)   to their cause.

Hacktivist
sensitive
disrupting
attention

Discover more resources for Computers