Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
14 questions
Show answers
  • Q1
    What is penetration testing?
    Emailing users of the network to see if they open a suspicious email
    Trying to gain access to someones network without their permission
    When someone tries to hack your network by entering every different password combination
    The practice of deliberately trying to find security holes in your own systems so that you can fix them
    45s
    3.6.1.c
  • Q2
    Which of the following is not a goal of penetration testing?
    Identify possible entry points
    Identify who has been using the network and for what use
    Seeing if it is possible to gain unauthorised access to the network
    Identify the targets of potential attacks
    45s
    3.6.1.c
  • Q3
    How much information is given to testers during black box testing?
    Testers are given the application in its entirety to test the functionality
    Testers are given the same knowledge as developers in regards to the code
    Testers are given the same knowledge that an employee would know
    Testers are given no more information than any potential hacker may have
    45s
    3.6.1.c
  • Q4
    How much information is given to testers during white box testing?
    Testers are given the application in its entirety to test the functionality
    Testers are given the code to test to see if it is efficiently written
    Testers are given as much information as an ‘insider’ may have
    Testers are given no more information than any potential hacker may have
    45s
    3.6.1.c
  • Q5
    What type of hackers are employed to put their expertise to good in finding system vulnerabilities?
    White hat hackers
    No one would employ a hacker
    Black hat hackers
    Grey hat hackers
    45s
    3.6.1.c
  • Q6
    What type of hacker will hack systems with criminal intent?
    Black hat hackers
    No hat hackers
    Grey hat hackers
    White hat hackers
    45s
    3.6.1.c
  • Q7
    What type of hackers will look for a flaw in a system and then approach a company or individual, and offer to fix it for a fee?
    Grey hat hackers
    Ethical hackers
    Black hat hackers
    White hat hackers
    45s
    3.6.1.c
  • Q8
    What type of testing is used to simulate a malicious person who has knowledge of the system credentials, who might try to attack it?
    White box testing
    White hat hacking
    Grey box testing
    Black box testing
    45s
    3.6.1.c
  • Q9
    What type of testing is used to simulate an external hacking attack?
    Grey box testing
    White hat hacking
    White box testing
    Black box testing
    45s
    3.6.1.c
  • Q10
    Penetration testing is a good example of __________ cyber security?
    Responsive
    Preventive
    Lazy
    Cheap
    45s
    3.6.1.c
  • Q11
    What law makes hacking a computer system illegal in the UK?
    Computer Misuse Act
    Hackers Act
    Copy right and patent Act
    Computer Act
    45s
    3.6.1.c
  • Q12
    Why could black box testing include the use of social engineering techniques?
    To trick employees into giving away their access information
    To spread a virus throughout the entire system
    To break the system further instead of looking for flaws
    To see how many users are not locking their computer when they leave it
    45s
    3.6.1.c
  • Q13
    What does authorised access mean?
    When someone has been given permission to access a network or device
    When someone accesses a network with their friends information
    When someone has not been given permission to access a network or device
    When a hacker gets into a network using valid credentials
    45s
    3.6.1.c
  • Q14
    What does the term system vulnerability mean?
    Any code that is poorly written or inefficient
    When old machines are being used instead of new ones
    Any potential weaknesses that make it at risk to cyber attack
    Any potential strengths that make it at risk to cyber attack
    45s
    3.6.1.c

Teachers give this quiz to your class