
Cybersecurity Summative
Authored by David Turner
Computers
12th Grade
Used 15+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a hacker who uses their skills for malicious purposes called?
White Hat Hacker
Black Hat Hacker
Grey Hat Hacker
Red Hat Hacker
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of hacker gains unauthorized access to computer systems for personal gain or to cause disruption?
Script Kiddie
Hacktivist
Insider Threat
Cybercriminal
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of hacker seeks to expose security vulnerabilities in systems and networks?
Script Kiddie
White Hat Hacker
Hacktivist
Cyberterrorist
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a hacker who uses hacking skills to promote political or social causes?
Black Hat Hacker
Grey Hat Hacker
Hacktivist
Script Kiddie
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a firewall?
A type of antivirus software
A network security device that monitors and controls incoming and outgoing network traffic
A tool used to encrypt data
A cybersecurity protocol
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a type of malware that spreads by attaching itself to other files?
Virus
Worm
Trojan
Spyware
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware encrypts files on a victim's computer and demands payment for their release?
Worm
Ransomware
Rootkit
Adware
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?