![placeholder image to represent content](/_next/image?url=%2Fassets%2Fquiz_default_logo.jpg&w=256&q=75)
CYBERSECURITY
Quiz by Ms. Lauber
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
3 questions
Show answers
- Q1The avenue or path a hacker uses to commit the attack is a(n) ____.B. attack vectorD. social engineering attackC. phreakingA. black hat email300s
- Q2Which of the following cyberattacks involves manipulating people to obtain information to hack computer systems?Social EngineeringMalwarePhreakingDumpster Diving300s
- Q3Which of the following is not a typical reason for using the darknet?B. Accessing blocked informationD. Criminal activity, such as selling credit card numbersA. Traditional web searchingC. Political and social activists promoting their cause300s