
2.2 and 2.3 Types of attackers
Authored by Sarah Wheeler
Computers
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the motivation for a Hacktivist?
Political
Financial
Create havoc
Personal use
2.
MULTIPLE SELECT QUESTION
45 sec • 2 pts
What is the motivation for a cyber criminal (pick 2)
Personal use
Financial gain
Espionage
Thrill
3.
MULTIPLE SELECT QUESTION
45 sec • 2 pts
What is the motivation for an insider (pick 2)
Personal use
Financial gain
Espionage
Thrill
4.
MULTIPLE SELECT QUESTION
45 sec • 2 pts
What is the motivation for a script kiddie (pick 2)
Publicity
Financial gain
Espionage
Thrill
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the motivation for a Vulnerability broker?
Publicity
Financial gain
Espionage
Thrill
6.
MULTIPLE SELECT QUESTION
45 sec • 2 pts
What is the motivation for a Phisher? (pick 2)
Publicity
Financial gain
Espionage
Theft
7.
MULTIPLE SELECT QUESTION
45 sec • 2 pts
What are 2 characteristic of a script kiddie?
Desires revenge
Little or no hacking skills
Teenager
often works in organised groups
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?