Ch 8.1 - System Hacking

Ch 8.1 - System Hacking

12th Grade

9 Qs

quiz-placeholder

Similar activities

Cyber Threats

Cyber Threats

9th Grade - University

14 Qs

Cisco CCST Objective 1

Cisco CCST Objective 1

12th Grade

10 Qs

Cyber Security

Cyber Security

12th Grade

10 Qs

Level 1 ICT: Security Quiz

Level 1 ICT: Security Quiz

12th Grade

12 Qs

8.3 Security of data (2)

8.3 Security of data (2)

9th - 12th Grade

13 Qs

Cyber Security

Cyber Security

12th Grade - Professional Development

8 Qs

BTEC cyber security

BTEC cyber security

9th - 12th Grade

10 Qs

CompTIA Practice Questions

CompTIA Practice Questions

12th Grade

10 Qs

Ch 8.1 - System Hacking

Ch 8.1 - System Hacking

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Nicole Nitschke

Used 7+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the easiest ways a hacker gains access to a system?

By intercepting email communications

Through passwords

By physically breaking into a facility

Through an unsecured Wi-Fi network

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a non-technical method hackers use to gain access to passwords?

Brute force attack

Dumpster diving

Pass the hash

Rainbow attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack relies on human error and social manipulation?

Social engineering

Sniffing

Keylogger

Dictionary attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common characteristic of passwords that makes them vulnerable to attacks?

Changes frequently

Short and simple

Long and complex

Uses a combination of letters and numbers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What technique involves testing every possible keystroke combination?

Social engineering

Brute force attack

Pass the hash

Rainbow attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does 'Pass the hash' technique exploit?

Hash of a user's password

Email vulnerabilities

Physical security lapses

Weak network security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a passive way to gain access to accounts?

Social engineering

Brute force

Sniffing

Dumpster diving

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the rtgen program in RainbowCrack?

To execute brute force attacks

To generate rainbow tables

To sort rainbow tables

To sniff network traffic

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What makes a hardware keylogger undetectable by desktop security software?

It is physically plugged into the computer

It operates remotely

It encrypts its data

It mimics normal USB device behavior