
Principles of Cybersecurity
Authored by Ben Joy
English, Computers
11th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A type of crime in which your private information is stolen and used for criminal activity is called:
Privacy Dilation
Facial Fraudulence
Identity Theft
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An unskilled person who uses programs developed by others to hack.
Script Kiddie
Hacktivist
Nation-State Hacker
Cybercriminal
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Subversive use of computer systems to promote a political/social agenda.
Script Kiddie
Hactivist
Nation-State Hacker
Cybercriminal
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Emailing to acquire sensitive information (passwords) by pretending to be a trustworthy entity.
Phishing
Zero-Day Exploit
DDOS
Backdoor
Botnet
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Taking advantage of a software vulnerability on the day it is discovered, before the developers can patch it.
Phishing
Zero-Day Exploit
Botnet
Backdoor
Social Engineering
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A malicious file that can attach to other files and replicate when the user shares the file.
Virus
Worm
Trojan
DDOS
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A malicious attempt to make an internet/network server unavailable to legitimate users.
Virus
Worm
Trojan
DDOS
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?