Hackers & Cyber Attacks: Crash Course Computer Science

Interactive Video
•
Information Technology (IT), Architecture
•
11th Grade - University
•
Easy
Wayground Content
Used 1+ times
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary motivation for black hat hackers?
To improve software security
To gain monetary benefits
To promote social causes
To learn new skills
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of hacker is often employed by companies to find security vulnerabilities?
Script kiddie
Gray hat
Black hat
White hat
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main goal of a phishing attack?
To crash a computer system
To steal user credentials
To encrypt files for ransom
To physically damage hardware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a pretexting attack, what do attackers typically pretend to be?
A software developer
An IT department employee
A company executive
A family member
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common form of malware that encrypts files and demands payment?
Ransomware
Spyware
Trojan horse
Adware
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of NAND mirroring in hacking?
To install malware
To delete system files
To bypass password attempts
To encrypt data
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a buffer overflow attack?
An attack that deletes files
An attack that floods the network
An attack that fills up the hard drive
An attack that overflows memory buffers
Create a free account and access millions of resources
Similar Resources on Wayground
6 questions
Bug Bounty Program Certification 1.2: How to Get Most Out of This Course?

Interactive video
•
University
8 questions
Tips, Tricks, and Techniques for Node.js Development 6.5: Detecting Vulnerabilities

Interactive video
•
University
8 questions
A Detailed Guide to the OWASP Top 10 - #3 Cross-Site Scripting Attacks

Interactive video
•
University
11 questions
Equifax Breach: Key Insights and Lessons

Interactive video
•
10th - 12th Grade
11 questions
How Computers Calculate - the ALU: Crash Course Computer Science

Interactive video
•
11th Grade - University
6 questions
Risk Management for Cyber Security Managers - What Is Vulnerability Management?

Interactive video
•
University
8 questions
How to Analyze a Cyber Attack

Interactive video
•
University
8 questions
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - XML Injection

Interactive video
•
University
Popular Resources on Wayground
10 questions
SR&R 2025-2026 Practice Quiz

Quiz
•
6th - 8th Grade
30 questions
Review of Grade Level Rules WJH

Quiz
•
6th - 8th Grade
6 questions
PRIDE in the Hallways and Bathrooms

Lesson
•
12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
15 questions
Subtracting Integers

Quiz
•
7th Grade
Discover more resources for Information Technology (IT)
6 questions
PRIDE in the Hallways and Bathrooms

Lesson
•
12th Grade
20 questions
Lab Safety and Lab Equipment

Quiz
•
9th - 12th Grade
7 questions
EAHS PBIS Lesson- Bathroom

Lesson
•
9th - 12th Grade
57 questions
How well do YOU know Neuwirth?

Quiz
•
9th - 12th Grade
20 questions
Getting to know YOU icebreaker activity!

Quiz
•
6th - 12th Grade
6 questions
Secondary Safety Quiz

Lesson
•
9th - 12th Grade
4 questions
Study Skills

Lesson
•
5th - 12th Grade
15 questions
Let's Take a Poll...

Quiz
•
9th Grade - University