Hackers & Cyber Attacks

Hackers & Cyber Attacks

12th Grade

21 Qs

quiz-placeholder

Similar activities

Cybersecurity2

Cybersecurity2

12th Grade

20 Qs

Final cybersecurity exam (A)

Final cybersecurity exam (A)

9th - 12th Grade

21 Qs

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

9th Grade - University

20 Qs

Threats to Data

Threats to Data

12th Grade

22 Qs

029_Malicious Updates – CompTIA Security+ SY0-701 – 2.3

029_Malicious Updates – CompTIA Security+ SY0-701 – 2.3

9th - 12th Grade

20 Qs

SECURITY TROUBLESHOOTING AND SOLUTIONS

SECURITY TROUBLESHOOTING AND SOLUTIONS

9th - 12th Grade

20 Qs

Seguridad en Internet para Estudiantes

Seguridad en Internet para Estudiantes

6th Grade - University

16 Qs

Domains 1-2 Sec+

Domains 1-2 Sec+

12th Grade

25 Qs

Hackers & Cyber Attacks

Hackers & Cyber Attacks

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Ron F.

Used 4+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
What is the primary goal of white hat hackers?
closing security holes
stealing data
selling vulnerabilities
creating malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Black hat hackers are known for their intentions to ___.
secure computer systems
write open-source software
educate the public on security
steal and exploit data

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Hacktivists use their skills to promote ___.
social or political goals
financial gain
amusement and curiosity
software development

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
The most common way hackers gain access to systems is through ___.
social engineering
brute force attacks
NAND mirroring
buffer overflow

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Phishing attacks often involve ___.
breaking into secure networks
fake emails asking for login information
exploiting hardware vulnerabilities
writing malicious code

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Pre-texting is a social engineering technique where attackers ___.
pretend to be from IT
send phishing emails
use malware to access data
brute force passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
What do Trojan horses masquerade as?
harmless attachments
secure websites
antivirus software
networking tools

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?