Hackers and Cyber Attacks

Hackers and Cyber Attacks

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Harmful Computer Programs

Harmful Computer Programs

10th Grade

15 Qs

System Threats and Vulnerablitiles

System Threats and Vulnerablitiles

10th Grade

10 Qs

Unit 3 - 2.3.1 Application Vulnerabilitites

Unit 3 - 2.3.1 Application Vulnerabilitites

9th Grade - University

6 Qs

Unit 3 - 2.4.12 Application Attacks Part 2

Unit 3 - 2.4.12 Application Attacks Part 2

9th Grade - University

7 Qs

Types of Malware

Types of Malware

6th - 9th Grade

14 Qs

Cyber Security

Cyber Security

12th Grade - Professional Development

8 Qs

Malware

Malware

7th - 11th Grade

15 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

Hackers and Cyber Attacks

Hackers and Cyber Attacks

Assessment

Passage

Computers

9th - 12th Grade

Medium

Created by

Nathan Renfro

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used for individuals who break into computer systems with malicious intent?

White Hats

Black Hats

Grey Hats

Hacktivists

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most common type of attack that involves tricking users into divulging confidential information?

Phishing

Buffer Overflow

Code Injection

Trojan Horse

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a program that masquerades as a harmless attachment but contains malicious software?

Spyware

Ransomware

Trojan Horse

Adware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the attack where an attacker calls a company and pretends to be from their IT department?

Buffer Overflow

Pretexting

Phishing

Code Injection

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a bug in a system that is successfully utilized by an attacker to gain capabilities or access?

Vulnerability

Malware

Exploit

Trojan Horse

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most common type of exploit used to attack websites that use databases?

Phishing

Buffer Overflow

Trojan Horse

Code Injection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a bug in a system that the software creators weren’t aware of?

Buffer Overflow

Day Zero Vulnerability

Zero Day Exploit

NAND Mirroring

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?