Hacker Quiz

Hacker Quiz

12th Grade

10 Qs

quiz-placeholder

Similar activities

Cybersecurity Online Threats

Cybersecurity Online Threats

9th - 12th Grade

12 Qs

Network Security Fundamentals Quiz

Network Security Fundamentals Quiz

12th Grade

11 Qs

Web/System Exploitation

Web/System Exploitation

1st Grade - Professional Development

9 Qs

DFIR Incidents and Containment

DFIR Incidents and Containment

12th Grade

10 Qs

Hacker quiz

Hacker quiz

9th - 12th Grade

8 Qs

Unit 1 - 2.1.1 - Threat Actors

Unit 1 - 2.1.1 - Threat Actors

9th - 12th Grade

9 Qs

Protecting Against AI Risks Quiz

Protecting Against AI Risks Quiz

12th Grade

15 Qs

J277 1.4 Network Security Quiz (Threats)

J277 1.4 Network Security Quiz (Threats)

9th - 12th Grade

13 Qs

Hacker Quiz

Hacker Quiz

Assessment

Passage

Computers

12th Grade

Easy

Created by

Howie Fuller

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used for hackers who exploit vulnerabilities in a system and then inform the company or organization about the problem?

White hats

Red hats

Black hats

Grey hats

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main role of white hat hackers?

To protect systems and patch up vulnerabilities

To cause mayhem and chaos

To steal information for personal gain

To exploit vulnerabilities in systems

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which famous hacker created the first worm-like virus known as the Morris Internet Worm?

Kevin Mitnick

Kevin Poulsen

Adrian Lamo

Robert Tappan Morris

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the controversial case involving hacker Adrian Lamo and US whistleblower Bradley (now Chelsea) Manning?

Lamo was involved in a controversial case involving US whistleblower Edward Snowden

Lamo was arrested for hacking The New York Times and tech behemoths Microsoft and Yahoo

Lamo was involved in a controversial case involving US whistleblower Julian Assange

Lamo was involved in a controversial case involving US whistleblower Bradley (now Chelsea) Manning

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What did Kevin Poulsen do to win a Porsche, leading to his rise to notoriety?

He hacked into federal systems and obtained FBI wiretap information

He crashed the network of AT&T

He hacked a radio station's phone lines to ensure he would win the Porsche

He created the first worm-like virus known as the Morris Internet Worm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What did Mark Abene do after his own consultancy firm folded after the dot-com bust in the early 2000s?

He became a journalist and at times helped law enforcement track down darker characters that plague the Internet

He started his own security company and concentrated his efforts on helping others to stave off black hats

He continued doing independent security consulting for a lot of large companies

He became a security consultant and worked for the FBI

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between black hat and white hat hackers?

Black hat hackers are unethical and cause harm, while white hat hackers protect systems and patch up vulnerabilities

Black hat hackers are the protectors of the binary realm, while white hat hackers exploit vulnerabilities in systems

Black hat hackers are hired by companies to protect systems, while white hat hackers exploit vulnerabilities in systems

Black hat hackers are ethical specialists of finding faults in systems, while white hat hackers steal information for personal gain

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers