Hackers and Cyber Attacks

Hackers and Cyber Attacks

9th - 12th Grade

5 Qs

quiz-placeholder

Similar activities

Unit 3 - 2.3.1 Application Vulnerabilitites

Unit 3 - 2.3.1 Application Vulnerabilitites

9th Grade - University

6 Qs

Physical Security

Physical Security

1st Grade - University

10 Qs

System Threats and Vulnerablitiles

System Threats and Vulnerablitiles

10th Grade

10 Qs

Unit 3 - 2.4.12 Application Attacks Part 2

Unit 3 - 2.4.12 Application Attacks Part 2

9th Grade - University

7 Qs

Crash Course Computer Science

Crash Course Computer Science

11th Grade

7 Qs

Technical Terms - Internet (A-Z) - Botnet

Technical Terms - Internet (A-Z) - Botnet

12th Grade

10 Qs

Unit 11 Topic B2 Network Components

Unit 11 Topic B2 Network Components

12th Grade

10 Qs

Cyber Security

Cyber Security

12th Grade - Professional Development

8 Qs

Hackers and Cyber Attacks

Hackers and Cyber Attacks

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Used 2+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the term used to describe hackers who are hired to evaluate and improve security systems?

Black Hats

White Hats

Grey Hats

Red Hats

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the most common type of social engineering attack mentioned in the video?

Phishing

Pretexting

Trojan Horses

Buffer Overflow

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What method do attackers use to force their way into computer systems when they don't have physical access to the device?

Brute force password attack

Code injection

Buffer overflow


 Exploiting bugs in the system

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the term used to describe a vulnerability that is exploited before a patch is released?

Day Zero vulnerability


Day One vulnerability




Day Two vulnerability

Day Three vulnerability

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the potential consequence of a Distributed Denial of Service (DDoS) attack?

Stealing sensitive information

Bringing down online services

Manipulating computer memory

Exploiting software bugs