Cybersecurity Chapter 1

Cybersecurity Chapter 1

11th Grade

8 Qs

quiz-placeholder

Similar activities

Ethics and Safety measures in Computing

Ethics and Safety measures in Computing

6th - 12th Grade

10 Qs

Neta Quiz 1

Neta Quiz 1

11th Grade

10 Qs

Interchange 2 Unit 7

Interchange 2 Unit 7

5th - 12th Grade

10 Qs

Computer Coding

Computer Coding

KG - Professional Development

12 Qs

Name That Logo!

Name That Logo!

9th - 12th Grade

13 Qs

Hacking

Hacking

9th - 12th Grade

10 Qs

จริยธรรมและอาชญากรรมคอมพิวเตอร์

จริยธรรมและอาชญากรรมคอมพิวเตอร์

11th Grade

10 Qs

Basic Networking (Y8)

Basic Networking (Y8)

7th Grade - University

10 Qs

Cybersecurity Chapter 1

Cybersecurity Chapter 1

Assessment

Quiz

Computers

11th Grade

Medium

Created by

E Sheng Toh

Used 2+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name is given to hackers who hack for a cause?

hactivist

white hat

blue hat

hacker

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?

Analyze

Securely Provision

Oversight and Development

Protect and Defend

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term BYOD represent?

bring your own device

bring your own disaster

bring your own decision

bring your own dog

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name is given to a amateur hacker?

blue team

script kiddie

black hat

red hat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an Internet data domain?

Linkedin

Cisco

Juniper

Palo Alto

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term vulnerability mean?

a known target or victim machine

a weakness that makes a target susceptible to an attack

a method of attack to exploit a target

a potential threat that a hacker creates

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym IoE represent?

Intelligence on Everything

Internet of Everyday

Internet of Everything

Insight into Everything

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

ping sweep

DDoS

DoS

spoof

Discover more resources for Computers