Cybersecurity 2.1 & 2.2

Cybersecurity 2.1 & 2.2

11th Grade

36 Qs

quiz-placeholder

Similar activities

98-367 PT3

98-367 PT3

9th - 12th Grade

35 Qs

internet terms gpaul

internet terms gpaul

6th Grade - University

32 Qs

CompTIA A+ U9

CompTIA A+ U9

9th Grade - Professional Development

31 Qs

AIJ XI

AIJ XI

11th Grade

40 Qs

6.2 Networking Basics

6.2 Networking Basics

10th - 11th Grade

32 Qs

Ulangan harian Bersama

Ulangan harian Bersama

11th Grade

41 Qs

IT Jobs

IT Jobs

9th - 12th Grade

32 Qs

Networks GCSE AQA 2018

Networks GCSE AQA 2018

10th - 11th Grade

35 Qs

Cybersecurity 2.1 & 2.2

Cybersecurity 2.1 & 2.2

Assessment

Quiz

Computers

11th Grade

Easy

Created by

LARRY GREEN

Used 1+ times

FREE Resource

36 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To perform acts of terrorism to nations or nation states

Script Kiddie

Insider

Hactivist

Cyber Syndicate

warfare/espionage

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of hacker uses this type of existing software to perform malicious activity

Script Kiddie

Insider

Hactivist

Cyber Syndicate

warfare/espionage

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This person usually works or goes to school at the location of where the information was stolen

Script Kiddie

Insider

Hactivist

Cyber Syndicate

warfare/espionage

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is a group of people working together to systematically perform attacks

Script Kiddie

Insider

Hactivist

Cyber Syndicate

warfare/espionage

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of hacker attacks systems to promote social or political change

Script Kiddie

Insider

Hactivist

Cyber Syndicate

warfare/espionage

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement is true of the "ILOVEYOU" worm?

A VB script kiddie was used to create a worm. The worm spread through email and infected computers, leaving them unable to boot.

A java script kiddie was used to create a worm. The worm spread through a popup and infected computers. The hacker was drawing attention to a social cause.

A VB program was created to shut down a company's email system. No email could be sent out over their network.

The program was created by a gray hat hacker that wanted to improve the morale at the company.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a DDoS attack?

Distributed denial of service.

Distributed demand for service.

Demand distribution of service.

None are correct.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?