Search Header Logo

iDEA | Cyber Spies & Internet & Web

Authored by H Malaney

Computers

6th - 8th Grade

Used 5+ times

iDEA | Cyber Spies & Internet & Web
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does DDoS stand for?

Distributed Data of Service
Dynamic Denial of Service
Decentralized Denial of Service
Distributed Denial of Service

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is hacking?

Hacking is the act of repairing computer systems.
Hacking refers to the process of creating software applications.
Hacking is the act of exploiting vulnerabilities in computer systems or networks to gain unauthorized access.
Hacking is a method of improving computer security.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Security Hole/Exploit?

A security hole is a vulnerability that can be exploited to compromise a system's security.
A security hole is a method to improve user access control.
A security hole is a feature that protects against cyber attacks.
A security hole is a type of software that enhances system performance.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the process that involves scrambling data into an unreadable format before sending so unauthorised recipients cannot access it?

Decryption
Compression
Encoding
Encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of virus disguises itself as something else within code to avoid detection?

Spyware

Worm

Virus

Trojan Horse

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a black hat hacker do?

A black hat hacker conducts illegal activities to exploit systems and networks.
A black hat hacker develops software for ethical hacking.
A black hat hacker protects systems from attacks.
A black hat hacker conducts security audits for companies.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do white hat hackers differ to black hat hackers?

Black hat hackers are government agents protecting systems.
White hat hackers are criminals who steal data.
White hat hackers are ethical and work to improve security, while black hat hackers are malicious and exploit vulnerabilities.
White hat hackers create malware to harm users.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?