
Cybersecurity - L1 Recap
Authored by Richard Colebrooke
Computers
8th Grade
Used 12+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the three 'types' of hacker?
Black hat, white hat, grey hat
Red hat, black hat, green hat
Good, bad, ugly
Elite, pro, novice
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which hacker is being described here?
'Everything they do is illegal/without permission'
Grey Hat
Black Hat
White Hat
None of these
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which hacker is being described here?
'Everything they do is legal/with permission'
Black Hat
Grey Hat
White Hat
None of these
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which hacker is being described here?
'Not everything they do is legal/with permission'
Black Hat
Grey Hat
White Hat
None of these
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Data that is made to look real but is actually fake is called what?
Phishing
Ransomware
Virus
Encryption
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of objects can hide dangerous links?
Email attachments
Web links
Programs/Code
All three
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these will encrypt all files on a user's machine and demand payment?
Ransomware
Bitcoin Miner
Keylogger
Trojan
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?