Hackers & Cyber Attacks

Hackers & Cyber Attacks

12th Grade

21 Qs

quiz-placeholder

Similar activities

CyberSafety Pre-Assessment

CyberSafety Pre-Assessment

KG - University

16 Qs

Utility Software

Utility Software

KG - University

22 Qs

Seguridad en Internet para Estudiantes

Seguridad en Internet para Estudiantes

6th Grade - University

16 Qs

Cyber Security Threats Quiz

Cyber Security Threats Quiz

9th - 12th Grade

16 Qs

Cybersecurity2

Cybersecurity2

12th Grade

20 Qs

cyber security intro

cyber security intro

9th - 12th Grade

18 Qs

PIK Kg Kadazan ICT & KDB Quiz - March 2021

PIK Kg Kadazan ICT & KDB Quiz - March 2021

1st Grade - Professional Development

20 Qs

036_Supply Chain Vulnerabilities – CompTIA Security+

036_Supply Chain Vulnerabilities – CompTIA Security+

9th - 12th Grade

20 Qs

Hackers & Cyber Attacks

Hackers & Cyber Attacks

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Ron F.

Used 4+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
What is the primary goal of white hat hackers?
closing security holes
stealing data
selling vulnerabilities
creating malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Black hat hackers are known for their intentions to ___.
secure computer systems
write open-source software
educate the public on security
steal and exploit data

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Hacktivists use their skills to promote ___.
social or political goals
financial gain
amusement and curiosity
software development

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
The most common way hackers gain access to systems is through ___.
social engineering
brute force attacks
NAND mirroring
buffer overflow

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Phishing attacks often involve ___.
breaking into secure networks
fake emails asking for login information
exploiting hardware vulnerabilities
writing malicious code

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Pre-texting is a social engineering technique where attackers ___.
pretend to be from IT
send phishing emails
use malware to access data
brute force passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
What do Trojan horses masquerade as?
harmless attachments
secure websites
antivirus software
networking tools

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?