Search Header Logo

Cybersecurity 2

Authored by Knight Brandon

Computers

12th Grade

Used 1+ times

Cybersecurity 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used for individuals who break into computer systems with their technical knowledge?

White Hats

Black Hats

Cybercriminals

Hacktivists

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most common type of attack used in social engineering?

Phishing

Pretexting

Trojan horses

Buffer overflow

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a trojan horse in a social engineering attack?

Promote a social or political goal

Steal data

Encrypt files

Force entry into a system

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the method used to gain access to a computer system by trying every combination of password until entry is gained?

Exploit

Brute force

Code injection

Buffer overflow

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used for a bug in a system that is successfully utilized to gain capabilities or access?

Buffer overflow

Code injection

Exploit

Phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of bounds checking in combating buffer overflow attacks?

Randomize memory location of variables

Inject purposeful new values into a program’s memory

Test the length of input before copying it into a buffer

Leave unused space after buffers

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most common type of attack used to exploit websites that use databases?

Brute force

Code injection

Phishing

Buffer overflow

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?