
2.2 Types of attackers
Authored by Emma Partridge
Computers
12th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do hacktivists aim to achieve with their hacking activities?
Personal entertainment
Educational purposes
Financial gain
Social change, political or terrorism.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Who are script kiddies in the context of hacking?
Experienced hackers
Government officials
Security experts
Inexperienced hackers
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main goal of scammers?
Reporting exploits to vendors
Tricking people for financial gain
Creating fear through disruption
Stealing personal information
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary objective of phishers?
Improving network security
Obtaining personal information
Creating social change
Defacing websites
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Who are insiders in the context of cyber security?
Government officials
Security experts
Experienced hackers
Legitimate users misusing their access
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What motivates cyber terrorists to disrupt computer networks?
Educational purposes
Personal entertainment
Religious or political beliefs
Financial gain
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What defines a cyber criminal?
Individual who reports exploits to vendors
Individual who commits illegal activities using computers
Individual who improves network security
Individual who creates fear through disruption
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?