Hackers & Cyber Attacks

Hackers & Cyber Attacks

12th Grade

21 Qs

quiz-placeholder

Similar activities

Exploring Computer Fundamentals

Exploring Computer Fundamentals

12th Grade

20 Qs

029_Malicious Updates – CompTIA Security+ SY0-701 – 2.3

029_Malicious Updates – CompTIA Security+ SY0-701 – 2.3

9th - 12th Grade

20 Qs

SECURITY TROUBLESHOOTING AND SOLUTIONS

SECURITY TROUBLESHOOTING AND SOLUTIONS

9th - 12th Grade

20 Qs

DSS Quiz

DSS Quiz

12th Grade

24 Qs

Security Threats

Security Threats

10th Grade - University

20 Qs

022_Phishing – CompTIA Security+ SY0-701 – 2.2

022_Phishing – CompTIA Security+ SY0-701 – 2.2

12th Grade

20 Qs

Cyber EOP - Social Engineering Attacks By Mr. B

Cyber EOP - Social Engineering Attacks By Mr. B

12th Grade - University

18 Qs

08 - Protecting Yourself QUIZ

08 - Protecting Yourself QUIZ

9th - 12th Grade

17 Qs

Hackers & Cyber Attacks

Hackers & Cyber Attacks

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Ron F.

Used 4+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
What is the primary goal of white hat hackers?
closing security holes
stealing data
selling vulnerabilities
creating malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Black hat hackers are known for their intentions to ___.
secure computer systems
write open-source software
educate the public on security
steal and exploit data

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Hacktivists use their skills to promote ___.
social or political goals
financial gain
amusement and curiosity
software development

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
The most common way hackers gain access to systems is through ___.
social engineering
brute force attacks
NAND mirroring
buffer overflow

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Phishing attacks often involve ___.
breaking into secure networks
fake emails asking for login information
exploiting hardware vulnerabilities
writing malicious code

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Pre-texting is a social engineering technique where attackers ___.
pretend to be from IT
send phishing emails
use malware to access data
brute force passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
What do Trojan horses masquerade as?
harmless attachments
secure websites
antivirus software
networking tools

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?