Cybersecurity 2.1 & 2.2

Cybersecurity 2.1 & 2.2

11th Grade

36 Qs

quiz-placeholder

Similar activities

Computers

Computers

9th - 12th Grade

40 Qs

ASTS KELAS 8

ASTS KELAS 8

9th - 12th Grade

41 Qs

EMPOWERMENT TECHNOLOGY FINAL EXAM

EMPOWERMENT TECHNOLOGY FINAL EXAM

11th Grade

40 Qs

Seguridad informática

Seguridad informática

11th - 12th Grade

35 Qs

CSEC IT - 11 Security Mechanisms

CSEC IT - 11 Security Mechanisms

10th - 12th Grade

31 Qs

CIBERSEGURIDAD DOMESTICA SUPER BÁSICA

CIBERSEGURIDAD DOMESTICA SUPER BÁSICA

KG - University

31 Qs

LifeSmarts Technology Quiz

LifeSmarts Technology Quiz

11th Grade

31 Qs

STS Informatika kelas 11 (Sept 2025)

STS Informatika kelas 11 (Sept 2025)

11th Grade

40 Qs

Cybersecurity 2.1 & 2.2

Cybersecurity 2.1 & 2.2

Assessment

Quiz

Computers

11th Grade

Easy

Created by

LARRY GREEN

Used 1+ times

FREE Resource

36 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To perform acts of terrorism to nations or nation states

Script Kiddie

Insider

Hactivist

Cyber Syndicate

warfare/espionage

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of hacker uses this type of existing software to perform malicious activity

Script Kiddie

Insider

Hactivist

Cyber Syndicate

warfare/espionage

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This person usually works or goes to school at the location of where the information was stolen

Script Kiddie

Insider

Hactivist

Cyber Syndicate

warfare/espionage

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is a group of people working together to systematically perform attacks

Script Kiddie

Insider

Hactivist

Cyber Syndicate

warfare/espionage

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of hacker attacks systems to promote social or political change

Script Kiddie

Insider

Hactivist

Cyber Syndicate

warfare/espionage

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement is true of the "ILOVEYOU" worm?

A VB script kiddie was used to create a worm. The worm spread through email and infected computers, leaving them unable to boot.

A java script kiddie was used to create a worm. The worm spread through a popup and infected computers. The hacker was drawing attention to a social cause.

A VB program was created to shut down a company's email system. No email could be sent out over their network.

The program was created by a gray hat hacker that wanted to improve the morale at the company.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a DDoS attack?

Distributed denial of service.

Distributed demand for service.

Demand distribution of service.

None are correct.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?