Studio - U3 - LO2-2.2 Types of Attackers

Studio - U3 - LO2-2.2 Types of Attackers

9th Grade

10 Qs

quiz-placeholder

Similar activities

Gr 9 E-Safety Quiz

Gr 9 E-Safety Quiz

9th Grade

10 Qs

Cybersecurity Basics 1.3

Cybersecurity Basics 1.3

7th - 9th Grade

6 Qs

societal impacts class12

societal impacts class12

KG - 12th Grade

10 Qs

IST Memory Quiz

IST Memory Quiz

9th - 12th Grade

10 Qs

Unit 7-Cybersecurity

Unit 7-Cybersecurity

9th Grade

12 Qs

cyber law

cyber law

9th - 12th Grade

10 Qs

CLO Computing: Ethical, Legal & Environmental

CLO Computing: Ethical, Legal & Environmental

9th - 11th Grade

10 Qs

Studio - U3 - LO2-2.2 Types of Attackers

Studio - U3 - LO2-2.2 Types of Attackers

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Andy Johnson

Used 6+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of a hacktivist?

To engage in illegal gambling

To cause political upheaval

To spread viruses

To make money

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do cybercriminals use computers as their weapon?

To carry out illegal gambling

To spread viruses

To perform spam and fraud

To save stolen data

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who is considered an insider in cyber security?

A script kiddie

A vulnerability broker

An individual who misuses legitimate access

A professional hacker

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a script kiddie known for?

Pursuit of knowledge

Self-education

Respect for skills

Non-serious hacking

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do vulnerability brokers do with exploit information?

Release it to the public

Sell it to other organizations

Use it for political reasons

Expose it to the media

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of scammers in cyber security?

To provide free administrative services

To spread viruses

To offer goods for free

To cheat users for money

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main method used by phishers in cyber security?

Email spoofing

Instant messaging

Text messaging

All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?