Search Header Logo

Understanding Cybersecurity and Cybercriminals

Authored by Damian Green

Computers

12th Grade

10 Questions

Used 6+ times

Understanding Cybersecurity and Cybercriminals
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

_____ is the practice of protecting systems, networks, and programs from digital attacks.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

_____ are hackers and other malicious users that use the Internet to commit crimes such as identity theft, spamming, phishing and other types of fraud.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A person who uses computers to gain unauthorized access to data is known as a _____.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

These hackers use their capabilities to uncover security failings to help safeguard organizations from dangerous hackers.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

This type of hacker infiltrates a computer system for malicious purposes.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

_____ is an authorized process to prevent cyberattacks and security breaches by lawfully hacking into the systems and looking for weak points.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Short for malicious software, _____ refers to any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?