Cybersecurity Summative

Cybersecurity Summative

12th Grade

40 Qs

quiz-placeholder

Similar activities

Câu hỏi trắc nghiệm về thông tin

Câu hỏi trắc nghiệm về thông tin

4th Grade - University

36 Qs

Komunikasi Nirkabel Pita Lebar

Komunikasi Nirkabel Pita Lebar

12th Grade

35 Qs

một số dịch vụ cơ bản của internet

một số dịch vụ cơ bản của internet

12th Grade

36 Qs

ôn tập 12k1

ôn tập 12k1

12th Grade

44 Qs

Ôn Tập Chuong III - Tin 11

Ôn Tập Chuong III - Tin 11

6th Grade - University

40 Qs

SIMKOMDIG

SIMKOMDIG

KG - University

40 Qs

EV.SII-VIRUS INFORMATICOS

EV.SII-VIRUS INFORMATICOS

1st - 12th Grade

39 Qs

City and Guilds Award in Cloud Services

City and Guilds Award in Cloud Services

12th Grade

40 Qs

Cybersecurity Summative

Cybersecurity Summative

Assessment

Quiz

Computers

12th Grade

Medium

Created by

David Turner

Used 15+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a hacker who uses their skills for malicious purposes called?

White Hat Hacker

Black Hat Hacker

Grey Hat Hacker

Red Hat Hacker

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of hacker gains unauthorized access to computer systems for personal gain or to cause disruption?

Script Kiddie

Hacktivist

Insider Threat

Cybercriminal

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of hacker seeks to expose security vulnerabilities in systems and networks?

Script Kiddie

White Hat Hacker

Hacktivist

Cyberterrorist

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a hacker who uses hacking skills to promote political or social causes?

Black Hat Hacker

Grey Hat Hacker

Hacktivist

Script Kiddie

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a firewall?

A type of antivirus software

A network security device that monitors and controls incoming and outgoing network traffic

A tool used to encrypt data

A cybersecurity protocol

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of malware that spreads by attaching itself to other files?

Virus

Worm

Trojan

Spyware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware encrypts files on a victim's computer and demands payment for their release?

Worm

Ransomware

Rootkit

Adware

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?