
Hackers & Cyber Attacks
Authored by Howie Fuller
Computers
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term used for manipulating a person into divulging confidential information or configuring a computer system to permit entry by attackers?
Trojan horse
SQL injection
Buffer overflow
Phishing
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of hackers are hired by companies and governments to perform security evaluations?
Cybercriminals
Black Hats
White Hats
Hacktivists
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the most common type of attack that involves sending an email asking the recipient to login to a fake website?
Phishing
Code injection
Pretexting
Buffer overflow
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term for a program that masquerades as harmless attachments but actually contains malicious software?
Trojan horse
Buffer overflow
Phishing
SQL injection
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term for trying every combination of password until gaining entry?
Brute force
SQL injection
Code injection
Buffer overflow
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term for a bug in a system that is successfully utilized by an attacker to gain capabilities or access?
Exploit
Phishing
Trojan horse
Buffer overflow
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term for a type of attack that involves overwriting adjacent data in memory by entering a password longer than the specified buffer size?
Brute force
SQL injection
Buffer overflow
Code injection
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
1.1.1 The structure and function of the processor
Quiz
•
11th Grade - University
15 questions
Data Security Worksheet
Quiz
•
10th Grade - University
15 questions
R13 AI and Machine Learning Assessment
Quiz
•
9th - 12th Grade
10 questions
MEDIA AND INFORMATION LITERACY
Quiz
•
12th Grade
10 questions
Quiz Keamanan Jaringan
Quiz
•
10th Grade - University
10 questions
INTRODUCCION A LAS BASES DE DATOS
Quiz
•
12th Grade
15 questions
Understanding Baking Principles
Quiz
•
8th Grade - University
11 questions
Threats to Data
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
18 questions
Valentines Day Trivia
Quiz
•
3rd Grade - University
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
21 questions
Presidents Day Trivia
Quiz
•
6th - 12th Grade
10 questions
Valentine's Day: History and Modern Celebration
Interactive video
•
9th - 12th Grade
11 questions
Valentine's Day Trivia
Quiz
•
8th - 12th Grade
10 questions
Factor Quadratic Expressions with Various Coefficients
Quiz
•
9th - 12th Grade
18 questions
Success Strategies
Quiz
•
9th - 12th Grade
10 questions
Valentine's Day Trivia
Quiz
•
9th - 12th Grade