2.1 Understanding Attacks

2.1 Understanding Attacks

12th Grade

18 Qs

quiz-placeholder

Similar activities

 Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

Malware And Hackers

Malware And Hackers

KG - University

14 Qs

PREGUNTAS INFORMATICA

PREGUNTAS INFORMATICA

9th - 12th Grade

15 Qs

Chapter 1: Getting Started with Digital Media

Chapter 1: Getting Started with Digital Media

12th Grade

19 Qs

Soal Informatika kelas 7

Soal Informatika kelas 7

12th Grade - University

20 Qs

Ulangan Harian 2 SKJ

Ulangan Harian 2 SKJ

12th Grade

22 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

WJEC ICT  - Chapter 3 -  Malware

WJEC ICT - Chapter 3 - Malware

10th Grade - University

19 Qs

2.1 Understanding Attacks

2.1 Understanding Attacks

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Amy Austin

Used 1+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered a type of targeted attack?

Phishing

Opportunistic attack

Insider

Nation state

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to individuals or groups that commit cybercrimes?

Competitor

IT Specialist

Cybercriminal

Network Administrator

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is used to describe a country that launches cyberattacks against another country?

Hacker

Cyberactivist

Nation state

Cyberterrorist

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to the type of threat that originates from within an organization?

External threat

Open-source intelligence (OSINT)

Internal threat

Persistent threat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for information gathered from publicly available sources to be used in an intelligence context?

Gray hat

Black hat

White hat

Open-source intelligence (OSINT)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes a hacker who violates computer security for little reason beyond maliciousness or for personal gain?

White hat

Black hat

Gray hat

External threat

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of hacker is known for ethical hacking, often employed to help improve systems security?

Black hat

Gray hat

White hat

Persistent threat

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?