Hackers: the Internet's immune system
Quiz by AithArter
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- view complete results in the Gradebook and Mastery Dashboards
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
Our brand new solo games combine with your quiz, on the same screen
Correct quiz answers unlock more play!
12 questions
Show answers
- Q1What is Malware?Weakness in a systemCriminal deception for financial profitProblem or faultSoftware intended to damage computer systems30sEditDelete
- Q2What is full disclosure?Criminal deception for financial profitMake something known for a entire societyWay of fixing a problem in computer program or systemStart of a social movement, revolution or protest30sEditDelete
- Q3What it does mean to spark?To turn off or disable a system in an emergencyCriminal deception for financial profitTo start something like a social movement, protest or revolutionA problem or fault in something30sEditDelete
- Q4How a weakness in a system is called that makes it easy to attack?WorkaroundVulnerabilityFlawFraud30sEditDelete
- Q5What is criminal deception to gain a financial profit?FraudFlawWorkaroundMalware30sEditDelete
- Q6What is a problem of fault in something?VulnerabilitySparkFlawFraud30sEditDelete
- Q7What is a good hacker is called?CrackerGrey hatWhite hatScripter30sEditDelete
- Q8Type of attack where hacker use someones else trusty ID to gain sensitive informationLogic BombRootkitDoS nad DDoS attackPhishing30sEditDelete
- Q9Type of malware designed to get sensitive informationsAdwareTrojanSpywareDropper30sEditDelete
- Q10What is Denial of Service Attack?Attack to get financial profitAttack to damage the systemAttack to shut down the whole system or a websiteAttack to gain sensitive information30sEditDelete
- Q11Attack in which hacker is succesfully identified as another user by falsifying the dataWhalingPhishingSniffingSpoofing30sEditDelete
- Q12What is beginner hacker called?Script YoungsterNoobNewbieScript Kiddie30sEditDelete