Search Header Logo

Cyberthreats

Authored by AMRITHA V NAIR 2338003

Education

Professional Development

Used 2+ times

Cyberthreats
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An unskilled person who uses programs developed by others to hack.

Script Kiddie

Hacktivist

Nation-State Hacker

Cybercriminal

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Subversive use of computer systems to promote a political/social agenda.

Script Kiddie

Hactivist

Nation-State Hacker

Cybercriminal

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious file that can attach to other files and replicate when the user shares the file.

Virus

Worm

Trojan

DDOS

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious program that pretends to be benign/normal.

Virus

Worm

Trojan

DDOS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker who violates computer security for personal gain.

Certified Ethical Hacker

Cybercriminal

Nation-State Hacker

Hactivist

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker who uses their access to harm their employer.

Hactivist

Nation-State Hacker

Malicious Insider

Certified Ethical Hacker

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is cybersecurity?

the state of being protected against the criminal or unauthorized use of electronic data,

Security against breaking into your house

Top secret Government security

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?