Ch 8.1 - System Hacking

Ch 8.1 - System Hacking

12th Grade

9 Qs

quiz-placeholder

Similar activities

Cybersecurity Quiz - IT Fundamentals

Cybersecurity Quiz - IT Fundamentals

Information Security Quiz

Information Security Quiz

Cybersecurity Basics Quiz

Cybersecurity Basics Quiz

Cyber Security Quiz

Cyber Security Quiz

Computer Security Quiz

Computer Security Quiz

CyberSecurity Vocabulary

CyberSecurity Vocabulary

Computer Safety

Computer Safety

Cybersecurity

Cybersecurity

Ch 8.1 - System Hacking

Ch 8.1 - System Hacking

Assessment

Quiz

Computers

12th Grade

Practice Problem

Hard

Created by

Nicole Nitschke

Used 18+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the easiest ways a hacker gains access to a system?

By intercepting email communications

Through passwords

By physically breaking into a facility

Through an unsecured Wi-Fi network

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a non-technical method hackers use to gain access to passwords?

Brute force attack

Dumpster diving

Pass the hash

Rainbow attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack relies on human error and social manipulation?

Social engineering

Sniffing

Keylogger

Dictionary attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common characteristic of passwords that makes them vulnerable to attacks?

Changes frequently

Short and simple

Long and complex

Uses a combination of letters and numbers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What technique involves testing every possible keystroke combination?

Social engineering

Brute force attack

Pass the hash

Rainbow attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does 'Pass the hash' technique exploit?

Hash of a user's password

Email vulnerabilities

Physical security lapses

Weak network security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a passive way to gain access to accounts?

Social engineering

Brute force

Sniffing

Dumpster diving

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the rtgen program in RainbowCrack?

To execute brute force attacks

To generate rainbow tables

To sort rainbow tables

To sniff network traffic

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What makes a hardware keylogger undetectable by desktop security software?

It is physically plugged into the computer

It operates remotely

It encrypts its data

It mimics normal USB device behavior