Cyber Security: Hackers

Cyber Security: Hackers

3rd Grade

7 Qs

quiz-placeholder

Similar activities

2. Day 1_ITBA 10 Soal

2. Day 1_ITBA 10 Soal

KG - Professional Development

10 Qs

Excel vocabulary

Excel vocabulary

3rd - 4th Grade

10 Qs

Coding

Coding

3rd - 6th Grade

10 Qs

Basic Algorithm elementary

Basic Algorithm elementary

3rd - 5th Grade

10 Qs

CIBERSEGURIDAD I

CIBERSEGURIDAD I

3rd Grade

10 Qs

OS Essentials - Chapter 14 (The IT Professional)

OS Essentials - Chapter 14 (The IT Professional)

KG - University

10 Qs

IDS

IDS

1st - 3rd Grade

10 Qs

go fun2

go fun2

1st - 5th Grade

10 Qs

Cyber Security: Hackers

Cyber Security: Hackers

Assessment

Quiz

Computers

3rd Grade

Practice Problem

Medium

Created by

Adrianna Dar

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

7 questions

Show all answers

1.

MATCH QUESTION

1 min • 1 pt

Match the following

Black Hat

These are ethical hackers who work to improve security.

Grey Hat

These hackers use their skills to promote political or social causes.

Social Engineer

These are malicious hackers who engage in illegal activities.

Hacktivist

These hackers use psychological manipulation to deceive individuals or gain unauthorized access.

White Hat

These hackers fall between white hat and black hat hackers.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of hacker rely on human interaction rather than technical exploits?

White Hat

Gtey Hat

Hacktivist

Social Engineer

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Social Engineers use impersonation and try to trick people into revealing

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Black Hat Hackers can engage in tasks such as:

unauthorised access to systems

stealing sensitive information

launching cyber attacks

testing system's vulnerabilities

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Grey Hat Hackers may engage in the following tasks:

exposing security flaws

testing system vulnerabilities

stealing personal data for financial use

blackmailing the organisation to control it

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

White Hat Hacker may engage in the following tasks:

testing system vulnerabilities

conducting security audits

identify weaknesses in a system

provide recommendations to enhance the security

7.

DRAG AND DROP QUESTION

1 min • 1 pt

​ (a)   tasks involve defacing websites, leaking ​ (b)   information, or ​ (c)   online services to draw ​ (d)   to their cause.

Hacktivist
sensitive
disrupting
attention

Discover more resources for Computers