Search Header Logo

Lesson 4 DDOS and Bots

Authored by Thomas Reynolds

Computers

8th Grade

Used 8+ times

Lesson 4 DDOS and Bots
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Trinity hacks into HMRC His Majestic Revenue Service database. She finds several vulnerabilities which she reports to the site owner. She hopes they will offer her a reward for the information. What type of hacking is this?

White hat hacking

Black hat hacking

Grey hat hacking

Script kiddie

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Trinity hacks into HMRC His Majestic Revenue Service database. She finds several vulnerabilities which she reports to the site owner. She hopes they will offer her a reward for the information. Is it ethical?

Yes, it is ethical because she reported the vulnerabilities.

No, it is not ethical because hacking is illegal.

It depends on the intention behind the hacking.

It is ethical if she gets permission afterwards.

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Trinity hacks into HMRC His Majestic Revenue Service database. She finds several vulnerabilities which she reports to the site owner. She hopes they will offer her a reward for the information. Is it legal?

Yes, it is legal to hack into databases if vulnerabilities are reported.

No, it is illegal to hack into databases regardless of intentions.

It depends on the country's laws regarding ethical hacking.

Only if she receives a reward, it becomes legal.

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What do you think would happen if servers suddenly had billions of requests per second?

Responses would become very slow

System may crash

Service would become unavailable

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Why would someone wish to make a system unavailable to others? Think how someone, an organisation, or country might benefit.

To gain a competitive advantage

To protect sensitive information

To disrupt an opponent's operations

All of the above

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What is meant by a client-server relationship?

A relationship where both parties are equal

A relationship where the client requests services and the server provides them

A relationship where the server requests services and the client provides them

A relationship where neither party requests or provides services

7.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

In a DoS attack, what is the primary action taken by the attacker?

The attacker sends a large number of requests to overwhelm the server.

The attacker steals sensitive data from the server.

The attacker installs malware on the server.

The attacker gains unauthorized access to the server.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?