Cybersecurity 2.1 & 2.2

Cybersecurity 2.1 & 2.2

11th Grade

36 Qs

quiz-placeholder

Similar activities

ASJ TKJ Debian 8.0

ASJ TKJ Debian 8.0

11th Grade

40 Qs

Excel Unit Review

Excel Unit Review

6th - 12th Grade

31 Qs

MTA - Windows Operating System

MTA - Windows Operating System

9th - 12th Grade

37 Qs

CSS Q1-Q#2ElementsOfComputerSystem

CSS Q1-Q#2ElementsOfComputerSystem

11th Grade

35 Qs

PAS Teknologi Layanan Jaringan XI TKJ 2023/2024

PAS Teknologi Layanan Jaringan XI TKJ 2023/2024

11th Grade

35 Qs

Von Neuman architecture

Von Neuman architecture

11th Grade

39 Qs

TLJ KLS 11 Siniu

TLJ KLS 11 Siniu

11th Grade

35 Qs

Google Apps

Google Apps

9th - 12th Grade

32 Qs

Cybersecurity 2.1 & 2.2

Cybersecurity 2.1 & 2.2

Assessment

Quiz

Computers

11th Grade

Practice Problem

Easy

Created by

LARRY GREEN

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

36 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To perform acts of terrorism to nations or nation states

Script Kiddie

Insider

Hactivist

Cyber Syndicate

warfare/espionage

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of hacker uses this type of existing software to perform malicious activity

Script Kiddie

Insider

Hactivist

Cyber Syndicate

warfare/espionage

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This person usually works or goes to school at the location of where the information was stolen

Script Kiddie

Insider

Hactivist

Cyber Syndicate

warfare/espionage

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is a group of people working together to systematically perform attacks

Script Kiddie

Insider

Hactivist

Cyber Syndicate

warfare/espionage

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of hacker attacks systems to promote social or political change

Script Kiddie

Insider

Hactivist

Cyber Syndicate

warfare/espionage

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement is true of the "ILOVEYOU" worm?

A VB script kiddie was used to create a worm. The worm spread through email and infected computers, leaving them unable to boot.

A java script kiddie was used to create a worm. The worm spread through a popup and infected computers. The hacker was drawing attention to a social cause.

A VB program was created to shut down a company's email system. No email could be sent out over their network.

The program was created by a gray hat hacker that wanted to improve the morale at the company.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a DDoS attack?

Distributed denial of service.

Distributed demand for service.

Demand distribution of service.

None are correct.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?