2.1 Understanding Attacks

2.1 Understanding Attacks

12th Grade

18 Qs

quiz-placeholder

Similar activities

Hackers Quiz

Hackers Quiz

12th Grade

15 Qs

Ethical Hacking Quiz

Ethical Hacking Quiz

12th Grade

15 Qs

Review ( Security )

Review ( Security )

12th Grade

16 Qs

Cybersecurity

Cybersecurity

7th - 12th Grade

20 Qs

IT Security - One

IT Security - One

12th Grade

20 Qs

Threats to Data

Threats to Data

12th Grade

22 Qs

1.4 - Network Attacks

1.4 - Network Attacks

7th - 12th Grade

14 Qs

Cybersecurity - Software Security

Cybersecurity - Software Security

12th Grade

20 Qs

2.1 Understanding Attacks

2.1 Understanding Attacks

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Amy Austin

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered a type of targeted attack?

Phishing

Opportunistic attack

Insider

Nation state

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to individuals or groups that commit cybercrimes?

Competitor

IT Specialist

Cybercriminal

Network Administrator

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is used to describe a country that launches cyberattacks against another country?

Hacker

Cyberactivist

Nation state

Cyberterrorist

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to the type of threat that originates from within an organization?

External threat

Open-source intelligence (OSINT)

Internal threat

Persistent threat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for information gathered from publicly available sources to be used in an intelligence context?

Gray hat

Black hat

White hat

Open-source intelligence (OSINT)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes a hacker who violates computer security for little reason beyond maliciousness or for personal gain?

White hat

Black hat

Gray hat

External threat

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of hacker is known for ethical hacking, often employed to help improve systems security?

Black hat

Gray hat

White hat

Persistent threat

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers