Cyber Security: Script Kiddies

Cyber Security: Script Kiddies

9th - 12th Grade

6 Qs

quiz-placeholder

Similar activities

Digital Security : Cyber Safety Quiz 2

Digital Security : Cyber Safety Quiz 2

9th - 10th Grade

10 Qs

Cisco CCST Objective 1

Cisco CCST Objective 1

12th Grade

10 Qs

Internet risks

Internet risks

9th - 11th Grade

10 Qs

A2 Computer Network-based Threats

A2 Computer Network-based Threats

12th Grade

11 Qs

Computer Security

Computer Security

10th Grade

7 Qs

Network Security Risks

Network Security Risks

12th Grade

10 Qs

Cyber Security

Cyber Security

12th Grade

10 Qs

Technical Terms - Internet (A-Z) - Denial of Service

Technical Terms - Internet (A-Z) - Denial of Service

12th Grade

10 Qs

Cyber Security: Script Kiddies

Cyber Security: Script Kiddies

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

H Valli

Used 5+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is True?

Hacking is gaining unauthorised access/control to a computer unless...

It is a friend or someone I know

They give me permission

They leave their computer unattended

It is a family member

Answer explanation

Media Image

Hacking in the context of cyber security is to: Gain unauthorised access and/or control of a computer system

For example: If you look over your friends shoulder for their password and break into their snapchat account without their permission, this would be considered hacking.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why might someone want to hack?

To steal data

For Fun

For Political Reasons

All of the above

Answer explanation

Media Image

People may want to hack for several reason such as:

- Financial Incentives i.e. stealing money from someone

- Data Theft i.e. stealing someone's data for a reason.

- For Fun i.e. breaking into a computer for other reason than just to have fun

- Ethical Motivation i.e. exposing someone for their wrong-doings,

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does DDoS Attack stand for...?

Distributed Denial of Service Attack

Dauntless Denial of Service Attack

Debilitate Denial of Service Attack

Defiance Denial of Service Attack

Answer explanation

Media Image

A DDoS (Distributed Denial of Service) attack is executed by flooding a targeted machine/ website with a lot of requests/data to overload a system

For example: crashing a website/game server by overloading it with data, to the extent that the website/server cannot cope with it, resulting in a crash.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Brute Force Attack?

Harming someone physically or virtually

Using a physical battering ram to break into a computer

Making multiple attempts to discover something i.e. password

None of the above

Answer explanation

Media Image

A Brute Force Attack is when you try multiple different combinations in order to break into a serve/account.

For example: trying all combinations of passwords to break into your friends account.

In the context of cybersecurity, the ideal way is to code a program to try all combinations including case senstive letters (upper and lower case), numbers and symbols.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between phishing (social engineering) and DDoS (script kiddies)?

Phishing does not require you to code but DDoS you need to know how to code

Phishing does not do too much harm whereas DDoS destroys the computer

DDoS is not as damaging as Phishing

Phishing is not real hacking whereas DDoS is considered as actual hacking

Answer explanation

Media Image

Hacking is defined as gaining unauthorised access/control to a computer

Therefore techniques such as DDoS-ing and Phishing are methods to gain information to either harm or gain access/control to a computer

DDoS requires script (code) to function whereas Phishing does not require code to function but can be used

6.

DRAG AND DROP QUESTION

1 min • 1 pt

​ (a)   is when someone tries to get sensitive information​ (b)   . All they need is a device and internet connection

A distributed ​ (c)   is when someone tries to shut down to a website and/or server ​ (d)   . They can't handle the requests and ​ (e)   .

Social Engineering
without writing any code
denial of service attack
by sending too many requests
shut down