Search Header Logo

Hackers and Cyber Attacks

Computers

9th - 12th Grade

Used 2+ times

Hackers and Cyber Attacks
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the term used to describe hackers who are hired to evaluate and improve security systems?

Black Hats

White Hats

Grey Hats

Red Hats

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the most common type of social engineering attack mentioned in the video?

Phishing

Pretexting

Trojan Horses

Buffer Overflow

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What method do attackers use to force their way into computer systems when they don't have physical access to the device?

Brute force password attack

Code injection

Buffer overflow


 Exploiting bugs in the system

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the term used to describe a vulnerability that is exploited before a patch is released?

Day Zero vulnerability


Day One vulnerability




Day Two vulnerability

Day Three vulnerability

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the potential consequence of a Distributed Denial of Service (DDoS) attack?

Stealing sensitive information

Bringing down online services

Manipulating computer memory

Exploiting software bugs


Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?