2.1 Understanding Attacks

2.1 Understanding Attacks

12th Grade

18 Qs

quiz-placeholder

Similar activities

IT Security - One

IT Security - One

12th Grade

20 Qs

Cybersecurity - Software Security

Cybersecurity - Software Security

12th Grade

20 Qs

BTEC IT Unit 1 - D threats to data & laws

BTEC IT Unit 1 - D threats to data & laws

11th - 12th Grade

20 Qs

Cybersecurity Vocabulary 2022

Cybersecurity Vocabulary 2022

9th - 12th Grade

18 Qs

cybersecurity_1

cybersecurity_1

12th Grade

14 Qs

Cybersecurity Review

Cybersecurity Review

7th - 12th Grade

20 Qs

Cybersecurity

Cybersecurity

7th - 12th Grade

20 Qs

Freedom of Speech and the Internet

Freedom of Speech and the Internet

9th - 12th Grade

15 Qs

2.1 Understanding Attacks

2.1 Understanding Attacks

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Amy Austin

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered a type of targeted attack?

Phishing

Opportunistic attack

Insider

Nation state

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to individuals or groups that commit cybercrimes?

Competitor

IT Specialist

Cybercriminal

Network Administrator

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is used to describe a country that launches cyberattacks against another country?

Hacker

Cyberactivist

Nation state

Cyberterrorist

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to the type of threat that originates from within an organization?

External threat

Open-source intelligence (OSINT)

Internal threat

Persistent threat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for information gathered from publicly available sources to be used in an intelligence context?

Gray hat

Black hat

White hat

Open-source intelligence (OSINT)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes a hacker who violates computer security for little reason beyond maliciousness or for personal gain?

White hat

Black hat

Gray hat

External threat

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of hacker is known for ethical hacking, often employed to help improve systems security?

Black hat

Gray hat

White hat

Persistent threat

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?