2.2 Types of attackers

2.2 Types of attackers

12th Grade

8 Qs

quiz-placeholder

Similar activities

CTEC IT Unit 3 PH Virtual Challenges

CTEC IT Unit 3 PH Virtual Challenges

12th Grade

10 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

Workshop - Introduce Of a Wireshark

Workshop - Introduce Of a Wireshark

1st Grade - University

12 Qs

Hukum dan Etik Internasional

Hukum dan Etik Internasional

12th Grade

10 Qs

Cyber Security

Cyber Security

9th - 12th Grade

10 Qs

PTS Informatika Gasal 22

PTS Informatika Gasal 22

10th - 12th Grade

10 Qs

Ict/cyberterrorism

Ict/cyberterrorism

KG - Professional Development

9 Qs

Digital Technology Careers Quiz

Digital Technology Careers Quiz

10th Grade - University

10 Qs

2.2 Types of attackers

2.2 Types of attackers

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Emma Partridge

Used 3+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do hacktivists aim to achieve with their hacking activities?

Personal entertainment

Educational purposes

Financial gain

Social change, political or terrorism.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who are script kiddies in the context of hacking?

Experienced hackers

Government officials

Security experts

Inexperienced hackers

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of scammers?

Reporting exploits to vendors

Tricking people for financial gain

Creating fear through disruption

Stealing personal information

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary objective of phishers?

Improving network security

Obtaining personal information

Creating social change

Defacing websites

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who are insiders in the context of cyber security?

Government officials

Security experts

Experienced hackers

Legitimate users misusing their access

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What motivates cyber terrorists to disrupt computer networks?

Educational purposes

Personal entertainment

Religious or political beliefs

Financial gain

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What defines a cyber criminal?

Individual who reports exploits to vendors

Individual who commits illegal activities using computers

Individual who improves network security

Individual who creates fear through disruption

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do vulnerability brokers do in the cyber security context?

Create fear through disruption

Deface websites

Steal personal information

Discover exploits and report them to vendors