Hackers & Cyber Attacks

Hackers & Cyber Attacks

12th Grade

21 Qs

quiz-placeholder

Similar activities

Chapter 1: Getting Started with Digital Media

Chapter 1: Getting Started with Digital Media

12th Grade

19 Qs

Phishing quiz

Phishing quiz

1st - 12th Grade

20 Qs

WJEC ICT  - Chapter 3 -  Malware

WJEC ICT - Chapter 3 - Malware

10th Grade - University

19 Qs

CompTIA standard 5 Exam Review

CompTIA standard 5 Exam Review

12th Grade

18 Qs

Cyber Fun Password Attack Quiz

Cyber Fun Password Attack Quiz

9th Grade - University

20 Qs

[AP CSP] Malware & Phishing Scams

[AP CSP] Malware & Phishing Scams

9th - 12th Grade

21 Qs

CIA Triad Summer School Exam 2

CIA Triad Summer School Exam 2

9th - 12th Grade

20 Qs

AP CSP Cybersecurity and Global Impacts

AP CSP Cybersecurity and Global Impacts

9th - 12th Grade

26 Qs

Hackers & Cyber Attacks

Hackers & Cyber Attacks

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Ron F.

Used 4+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
What is the primary goal of white hat hackers?
closing security holes
stealing data
selling vulnerabilities
creating malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Black hat hackers are known for their intentions to ___.
secure computer systems
write open-source software
educate the public on security
steal and exploit data

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Hacktivists use their skills to promote ___.
social or political goals
financial gain
amusement and curiosity
software development

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
The most common way hackers gain access to systems is through ___.
social engineering
brute force attacks
NAND mirroring
buffer overflow

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Phishing attacks often involve ___.
breaking into secure networks
fake emails asking for login information
exploiting hardware vulnerabilities
writing malicious code

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Pre-texting is a social engineering technique where attackers ___.
pretend to be from IT
send phishing emails
use malware to access data
brute force passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
What do Trojan horses masquerade as?
harmless attachments
secure websites
antivirus software
networking tools

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?