iDEA | Cyber Spies & Internet & Web

iDEA | Cyber Spies & Internet & Web

6th - 8th Grade

10 Qs

quiz-placeholder

Similar activities

Firewall

Firewall

6th Grade

6 Qs

NOVA Cybersecurity 101

NOVA Cybersecurity 101

6th - 12th Grade

13 Qs

Delitos Informáticos

Delitos Informáticos

7th Grade

12 Qs

hacking

hacking

7th Grade

5 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Malware And Hackers

Malware And Hackers

KG - University

14 Qs

Social Engineering

Social Engineering

8th Grade

10 Qs

Internet Security

Internet Security

3rd - 10th Grade

10 Qs

iDEA | Cyber Spies & Internet & Web

iDEA | Cyber Spies & Internet & Web

Assessment

Quiz

Computers

6th - 8th Grade

Hard

Created by

H Malaney

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does DDoS stand for?

Distributed Data of Service
Dynamic Denial of Service
Decentralized Denial of Service
Distributed Denial of Service

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is hacking?

Hacking is the act of repairing computer systems.
Hacking refers to the process of creating software applications.
Hacking is the act of exploiting vulnerabilities in computer systems or networks to gain unauthorized access.
Hacking is a method of improving computer security.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Security Hole/Exploit?

A security hole is a vulnerability that can be exploited to compromise a system's security.
A security hole is a method to improve user access control.
A security hole is a feature that protects against cyber attacks.
A security hole is a type of software that enhances system performance.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the process that involves scrambling data into an unreadable format before sending so unauthorised recipients cannot access it?

Decryption
Compression
Encoding
Encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of virus disguises itself as something else within code to avoid detection?

Spyware

Worm

Virus

Trojan Horse

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a black hat hacker do?

A black hat hacker conducts illegal activities to exploit systems and networks.
A black hat hacker develops software for ethical hacking.
A black hat hacker protects systems from attacks.
A black hat hacker conducts security audits for companies.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do white hat hackers differ to black hat hackers?

Black hat hackers are government agents protecting systems.
White hat hackers are criminals who steal data.
White hat hackers are ethical and work to improve security, while black hat hackers are malicious and exploit vulnerabilities.
White hat hackers create malware to harm users.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?