Search Header Logo

Principles of Cybersecurity

Authored by Ben Joy

English, Computers

11th Grade

Used 1+ times

Principles of Cybersecurity
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of crime in which your private information is stolen and used for criminal activity is called:

Privacy Dilation

Burglary

Facial Fraudulence

Identity Theft

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An unskilled person who uses programs developed by others to hack.

Script Kiddie

Hacktivist

Nation-State Hacker

Cybercriminal

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Subversive use of computer systems to promote a political/social agenda.

Script Kiddie

Hactivist

Nation-State Hacker

Cybercriminal

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Emailing to acquire sensitive information (passwords) by pretending to be a trustworthy entity.

Phishing

Zero-Day Exploit

DDOS

Backdoor

Botnet

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Taking advantage of a software vulnerability on the day it is discovered, before the developers can patch it.

Phishing

Zero-Day Exploit

Botnet

Backdoor

Social Engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious file that can attach to other files and replicate when the user shares the file.

Virus

Worm

Trojan

DDOS

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious attempt to make an internet/network server unavailable to legitimate users.

Virus

Worm

Trojan

DDOS

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?