Hackers and Cyber Attacks

Hackers and Cyber Attacks

9th - 12th Grade

5 Qs

quiz-placeholder

Similar activities

Cybersecurity and Crime Quiz

Cybersecurity and Crime Quiz

10th Grade

10 Qs

InfoSec: C.I.A. Triangle

InfoSec: C.I.A. Triangle

10th Grade - University

10 Qs

Studio - U3 - L02.1 Threats to Cyber Security

Studio - U3 - L02.1 Threats to Cyber Security

9th Grade

10 Qs

Certiport Network Security

Certiport Network Security

11th Grade

5 Qs

Flashback Quiz 2

Flashback Quiz 2

11th Grade

10 Qs

Threats and Vulnerabilities

Threats and Vulnerabilities

10th - 12th Grade

7 Qs

Unit 3 - 4.1.4 Application Security

Unit 3 - 4.1.4 Application Security

9th Grade - University

10 Qs

Hackers and Cyber Attacks

Hackers and Cyber Attacks

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Used 2+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the term used to describe hackers who are hired to evaluate and improve security systems?

Black Hats

White Hats

Grey Hats

Red Hats

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the most common type of social engineering attack mentioned in the video?

Phishing

Pretexting

Trojan Horses

Buffer Overflow

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What method do attackers use to force their way into computer systems when they don't have physical access to the device?

Brute force password attack

Code injection

Buffer overflow


 Exploiting bugs in the system

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the term used to describe a vulnerability that is exploited before a patch is released?

Day Zero vulnerability


Day One vulnerability




Day Two vulnerability

Day Three vulnerability

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the potential consequence of a Distributed Denial of Service (DDoS) attack?

Stealing sensitive information

Bringing down online services

Manipulating computer memory

Exploiting software bugs