Ch 8.1 - System Hacking

Ch 8.1 - System Hacking

12th Grade

9 Qs

quiz-placeholder

Similar activities

Python Libraries - Random Numbers

Python Libraries - Random Numbers

12th Grade

10 Qs

Are YOU a Minecraft Pro?

Are YOU a Minecraft Pro?

3rd Grade - Professional Development

12 Qs

Physical Security

Physical Security

1st Grade - University

10 Qs

Townhall TE

Townhall TE

KG - Professional Development

7 Qs

Cyber Security

Cyber Security

9th - 12th Grade

10 Qs

Understanding Data Transformation Techniques

Understanding Data Transformation Techniques

12th Grade - University

10 Qs

Activity 2.1.3 Password Strength -- Strong!

Activity 2.1.3 Password Strength -- Strong!

9th - 12th Grade

7 Qs

015_Key Exchange - CompTIA Security+ SY0-701 - 1.4

015_Key Exchange - CompTIA Security+ SY0-701 - 1.4

9th Grade - University

13 Qs

Ch 8.1 - System Hacking

Ch 8.1 - System Hacking

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Nicole Nitschke

Used 11+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the easiest ways a hacker gains access to a system?

By intercepting email communications

Through passwords

By physically breaking into a facility

Through an unsecured Wi-Fi network

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a non-technical method hackers use to gain access to passwords?

Brute force attack

Dumpster diving

Pass the hash

Rainbow attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack relies on human error and social manipulation?

Social engineering

Sniffing

Keylogger

Dictionary attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common characteristic of passwords that makes them vulnerable to attacks?

Changes frequently

Short and simple

Long and complex

Uses a combination of letters and numbers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What technique involves testing every possible keystroke combination?

Social engineering

Brute force attack

Pass the hash

Rainbow attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does 'Pass the hash' technique exploit?

Hash of a user's password

Email vulnerabilities

Physical security lapses

Weak network security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a passive way to gain access to accounts?

Social engineering

Brute force

Sniffing

Dumpster diving

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the rtgen program in RainbowCrack?

To execute brute force attacks

To generate rainbow tables

To sort rainbow tables

To sniff network traffic

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What makes a hardware keylogger undetectable by desktop security software?

It is physically plugged into the computer

It operates remotely

It encrypts its data

It mimics normal USB device behavior