Hackers & Cyber Attacks

Hackers & Cyber Attacks

12th Grade

21 Qs

quiz-placeholder

Similar activities

Cyber Security

Cyber Security

8th - 12th Grade

20 Qs

BTEC IT Unit 1 - D threats to data & laws

BTEC IT Unit 1 - D threats to data & laws

11th - 12th Grade

20 Qs

Cyber EOP - Anti-Virus/Malware & Removal By Mr. B

Cyber EOP - Anti-Virus/Malware & Removal By Mr. B

12th Grade - University

18 Qs

G11&&12_Quiz1_2024_Cybersecurity

G11&&12_Quiz1_2024_Cybersecurity

12th Grade

20 Qs

Digital Media - Chapter 1

Digital Media - Chapter 1

9th - 12th Grade

20 Qs

Cybersecurity Awareness

Cybersecurity Awareness

12th Grade

20 Qs

AP CSP Unit 4 Ch 1 Vocab

AP CSP Unit 4 Ch 1 Vocab

9th - 12th Grade

19 Qs

Cybersecurity Threats and Prevention Quiz

Cybersecurity Threats and Prevention Quiz

9th Grade - University

20 Qs

Hackers & Cyber Attacks

Hackers & Cyber Attacks

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Ron F.

Used 4+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
What is the primary goal of white hat hackers?
closing security holes
stealing data
selling vulnerabilities
creating malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Black hat hackers are known for their intentions to ___.
secure computer systems
write open-source software
educate the public on security
steal and exploit data

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Hacktivists use their skills to promote ___.
social or political goals
financial gain
amusement and curiosity
software development

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
The most common way hackers gain access to systems is through ___.
social engineering
brute force attacks
NAND mirroring
buffer overflow

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Phishing attacks often involve ___.
breaking into secure networks
fake emails asking for login information
exploiting hardware vulnerabilities
writing malicious code

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Pre-texting is a social engineering technique where attackers ___.
pretend to be from IT
send phishing emails
use malware to access data
brute force passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
What do Trojan horses masquerade as?
harmless attachments
secure websites
antivirus software
networking tools

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?