Gencyber

Gencyber

6th - 8th Grade

22 Qs

quiz-placeholder

Similar activities

Types of Cyberthreat

Types of Cyberthreat

8th Grade

20 Qs

Year 7 termly review - November

Year 7 termly review - November

7th Grade

22 Qs

round 2 development of computer

round 2 development of computer

7th Grade

21 Qs

CLASS 9 COMPUTER

CLASS 9 COMPUTER

8th - 9th Grade

18 Qs

Keyboarding & Computer Ethics

Keyboarding & Computer Ethics

8th Grade

20 Qs

Cybersecurity

Cybersecurity

7th Grade

20 Qs

Internet Basics

Internet Basics

7th Grade

24 Qs

Computers

Computers

6th Grade

21 Qs

Gencyber

Gencyber

Assessment

Quiz

Computers

6th - 8th Grade

Hard

Created by

Jose Manuel Rios

FREE Resource

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Characteristics

It could refer to a hacker who specifically targets Linux systems

Also called an ethical hacker or computer security expert.

Gains unauthorized access to a computer system or network for malicious purposes:

Illegally breaks into a computer system but does not have any malicious intent.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Characteristics

It could refer to a hacker who specifically targets Linux systems

Also called an ethical hacker or computer security expert.

Is an individual that has knowledge regarding computer security and is hired to test for errors, bugs, or security exploits of software, web applications, or computer systems.

Illegally breaks into a computer system but does not have any malicious intent.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Characteristics

It could refer to a hacker who specifically targets Linux systems

Refers to an individual that is just starting to learn about hacking and has little to no knowledge of the workings of the Internet.

Is an individual that has knowledge regarding computer security and is hired to test for errors, bugs, or security exploits of software, web applications, or computer systems.

Illegally breaks into a computer system but does not have any malicious intent.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Characteristics

It could refer to a hacker who specifically targets Linux systems

Refers to an individual that is just starting to learn about hacking and has little to no knowledge of the workings of the Internet.

Is an individual that has knowledge regarding computer security and is hired to test for errors

Illegally breaks into a computer system but does not have any malicious intent.

Black hat hackers are the evil guys who want to use their technical skills to defraud and blackmail others.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Characteristics

It could refer to a hacker who specifically targets Linux systems

Refers to an individual that is just starting to learn about hacking and has little to no knowledge of the workings of the Internet.

Is an individual that has knowledge regarding computer security and is hired to test for errors, bugs, or security exploits of software, web applications, or computer systems.

Illegally breaks into a computer system but does not have any malicious intent.

is an ethical security hacker.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Characteristics

It could refer to a hacker who specifically targets Linux systems

Refers to an individual that is just starting to learn about hacking and has little to no knowledge of the workings of the Internet.

Is an individual that has knowledge regarding computer security and is hired to test for errors, bugs, or security exploits of software, web applications, or computer systems.

Illegally breaks into a computer system with malicius intent.

Many of them simply enjoy hacking as a hobby and try to find new exploits and vulnerabilities for fun.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Deepfake?

Consists of computer-created fake videos or images using digital software, machine learning and face swapping.

Is a person that creates an online account using a fake identity with the intention to trick people who are in search of love.

is defined as the data providing information about one or more aspects of the data.

Is an interactive experience that combines the digital and physical worlds, where the interaction is made in real time

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?