placeholder image to represent content

ChatGPT Quiz: Basics of Hacking #1

Quiz by OXFORD SCHOOL

Feel free to use or edit a copy

includes Teacher and Student dashboards

Measure skills
from any curriculum

Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.

With a free account, teachers can
  • edit the questions
  • save a copy for later
  • start a class game
  • automatically assign follow-up activities based on students’ scores
  • assign as homework
  • share a link with colleagues
  • print as a bubble sheet

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
10 questions
Show answers
  • Q1
    What is the definition of a hacker?
    A person who uses computers to gain authorized access to data.
    A person who uses computers to gain unauthorized access to data.
    A person who sells stolen data on the black market.
    A person who creates computer viruses.
    30s
  • Q2
    What is a keylogger?
    A program that scans a computer for vulnerabilities.
    A program that displays an error message on a computer.
    A program that records every keystroke made on a computer.
    A program that deletes files on a computer.
    30s
  • Q3
    What is a brute-force attack?
    A trial-and-error method used to guess a password.
    A method used to hack into a computer using a USB drive.
    A method used to hack into a computer using a remote access tool.
    A method used to trick someone into giving up their password.
    30s
  • Q4
    What is a firewall?
    A program that blocks unauthorized access to a computer network.
    A program that deletes files on a computer.
    A program that displays a warning message on a computer.
    A program that scans a computer for viruses.
    30s
  • Q5
    What is social engineering?
    The use of malware to gain unauthorized access to a computer.
    The use of brute-force attacks to guess passwords.
    The use of denial-of-service attacks to shut down a website.
    The use of psychological manipulation to obtain sensitive information.
    30s
  • Q6
    What is a phishing attack?
    A method used to hack into a computer using a remote access tool.
    A fraudulent attempt to obtain sensitive information through email or a fake website.
    A method used to trick someone into giving up their password.
    A method used to hack into a computer using a USB drive.
    30s
  • Q7
    What is a vulnerability?
    A program that displays a warning message on a computer.
    A program that deletes files on a computer.
    A program that scans a computer for viruses.
    A weakness in a computer system that can be exploited by a hacker.
    30s
  • Q8
    What is a Trojan horse?
    A program that displays an error message on a computer.
    A program that scans a computer for vulnerabilities.
    A program that deletes files on a computer.
    A type of malware that disguises itself as a legitimate program.
    30s
  • Q9
    What is two-factor authentication?
    A security process that requires a password and a fingerprint to access an account.
    A security process that requires one form of identification to access an account.
    A security process that requires two forms of identification to access an account.
    A security process that allows unlimited attempts to access an account.
    30s
  • Q10
    What is encryption?
    The process of deleting information from a computer.
    The process of blocking access to a website.
    The process of scanning a computer for viruses.
    The process of converting information into code to prevent unauthorized access.
    30s

Teachers give this quiz to your class