![placeholder image to represent content](/_next/image?url=%2Fassets%2Fquiz_default_logo.jpg&w=256&q=75)
ChatGPT Quiz: Basics of Hacking #1
Quiz by OXFORD SCHOOL
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
10 questions
Show answers
- Q1What is the definition of a hacker?A person who uses computers to gain authorized access to data.A person who uses computers to gain unauthorized access to data.A person who sells stolen data on the black market.A person who creates computer viruses.30s
- Q2What is a keylogger?A program that scans a computer for vulnerabilities.A program that displays an error message on a computer.A program that records every keystroke made on a computer.A program that deletes files on a computer.30s
- Q3What is a brute-force attack?A trial-and-error method used to guess a password.A method used to hack into a computer using a USB drive.A method used to hack into a computer using a remote access tool.A method used to trick someone into giving up their password.30s
- Q4What is a firewall?A program that blocks unauthorized access to a computer network.A program that deletes files on a computer.A program that displays a warning message on a computer.A program that scans a computer for viruses.30s
- Q5What is social engineering?The use of malware to gain unauthorized access to a computer.The use of brute-force attacks to guess passwords.The use of denial-of-service attacks to shut down a website.The use of psychological manipulation to obtain sensitive information.30s
- Q6What is a phishing attack?A method used to hack into a computer using a remote access tool.A fraudulent attempt to obtain sensitive information through email or a fake website.A method used to trick someone into giving up their password.A method used to hack into a computer using a USB drive.30s
- Q7What is a vulnerability?A program that displays a warning message on a computer.A program that deletes files on a computer.A program that scans a computer for viruses.A weakness in a computer system that can be exploited by a hacker.30s
- Q8What is a Trojan horse?A program that displays an error message on a computer.A program that scans a computer for vulnerabilities.A program that deletes files on a computer.A type of malware that disguises itself as a legitimate program.30s
- Q9What is two-factor authentication?A security process that requires a password and a fingerprint to access an account.A security process that requires one form of identification to access an account.A security process that requires two forms of identification to access an account.A security process that allows unlimited attempts to access an account.30s
- Q10What is encryption?The process of deleting information from a computer.The process of blocking access to a website.The process of scanning a computer for viruses.The process of converting information into code to prevent unauthorized access.30s