Hacker quiz

Hacker quiz

9th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

Cybersecurity Quiz from Youtube

Cybersecurity Quiz from Youtube

10th Grade

13 Qs

Computer Viruses

Computer Viruses

6th - 10th Grade

10 Qs

Bảo mật mạng

Bảo mật mạng

11th Grade

10 Qs

Network Security

Network Security

10th Grade

12 Qs

Networks

Networks

8th - 9th Grade

13 Qs

Y9 Hwk Quiz 2 (rise of the bots)

Y9 Hwk Quiz 2 (rise of the bots)

9th Grade

13 Qs

Malware Knowledge Quiz

Malware Knowledge Quiz

9th - 12th Grade

12 Qs

AQA GCSE CS: Cyber Security

AQA GCSE CS: Cyber Security

9th - 11th Grade

7 Qs

Hacker quiz

Hacker quiz

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Jakub _8b

Used 8+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

White Hat Hackers:

Also known as "ethical hackers"

These are the bad guys who use their skills to gain unauthorized access to systems and networks

they don't have malicious intent, but they don't always obtain permission to hack into systems or networks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Black Hat Hackers:

Also known as "ethical hackers"

These are the bad guys who use their skills to gain unauthorized access to systems and networks

they don't have malicious intent, but they don't always obtain permission to hack into systems or networks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gray Hat Hackers:

Also known as "ethical hackers"

These are the bad guys who use their skills to gain unauthorized access to systems and networks

they don't have malicious intent, but they don't always obtain permission to hack into systems or networks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The term "hacker" originated at:

MIT

MAT

MTI

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Adrian ... was known for hacking into the computer systems of The New York Times and several other organizations

Lame

Lamo

Lema

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gary ... is a British hacker who was accused of hacking into the computer systems of the U.S. military and NASA in the early 2000s:

McKinnon

McKinn

McKennon

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This technique involves manipulating people into divulging sensitive information or performing actions that can be used to gain unauthorized access:

Phishing

Malware

Social Engineering

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious software that is designed to infiltrate or damage a computer system:

Phishing

Malware

Social Engineering