Feel free to use or edit a copy
includes Teacher and Student dashboards
Measures 1 skill from
Measures 1 skill from
Track each student's skills and progress in your Mastery dashboards
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
14 questions
Show answers
- Q1What is penetration testing?Emailing users of the network to see if they open a suspicious emailTrying to gain access to someones network without their permissionWhen someone tries to hack your network by entering every different password combinationThe practice of deliberately trying to find security holes in your own systems so that you can fix them45s3.6.1.c
- Q2Which of the following is not a goal of penetration testing?Identify possible entry pointsIdentify who has been using the network and for what useSeeing if it is possible to gain unauthorised access to the networkIdentify the targets of potential attacks45s3.6.1.c
- Q3How much information is given to testers during black box testing?Testers are given the application in its entirety to test the functionalityTesters are given the same knowledge as developers in regards to the codeTesters are given the same knowledge that an employee would knowTesters are given no more information than any potential hacker may have45s3.6.1.c
- Q4How much information is given to testers during white box testing?Testers are given the application in its entirety to test the functionalityTesters are given the code to test to see if it is efficiently writtenTesters are given as much information as an ‘insider’ may haveTesters are given no more information than any potential hacker may have45s3.6.1.c
- Q5What type of hackers are employed to put their expertise to good in finding system vulnerabilities?White hat hackersNo one would employ a hackerBlack hat hackersGrey hat hackers45s3.6.1.c
- Q6What type of hacker will hack systems with criminal intent?Black hat hackersNo hat hackersGrey hat hackersWhite hat hackers45s3.6.1.c
- Q7What type of hackers will look for a flaw in a system and then approach a company or individual, and offer to fix it for a fee?Grey hat hackersEthical hackersBlack hat hackersWhite hat hackers45s3.6.1.c
- Q8What type of testing is used to simulate a malicious person who has knowledge of the system credentials, who might try to attack it?White box testingWhite hat hackingGrey box testingBlack box testing45s3.6.1.c
- Q9What type of testing is used to simulate an external hacking attack?Grey box testingWhite hat hackingWhite box testingBlack box testing45s3.6.1.c
- Q10Penetration testing is a good example of __________ cyber security?ResponsivePreventiveLazyCheap45s3.6.1.c
- Q11What law makes hacking a computer system illegal in the UK?Computer Misuse ActHackers ActCopy right and patent ActComputer Act45s3.6.1.c
- Q12Why could black box testing include the use of social engineering techniques?To trick employees into giving away their access informationTo spread a virus throughout the entire systemTo break the system further instead of looking for flawsTo see how many users are not locking their computer when they leave it45s3.6.1.c
- Q13What does authorised access mean?When someone has been given permission to access a network or deviceWhen someone accesses a network with their friends informationWhen someone has not been given permission to access a network or deviceWhen a hacker gets into a network using valid credentials45s3.6.1.c
- Q14What does the term system vulnerability mean?Any code that is poorly written or inefficientWhen old machines are being used instead of new onesAny potential weaknesses that make it at risk to cyber attackAny potential strengths that make it at risk to cyber attack45s3.6.1.c