Using general knowledge of human behavior to trick users into breaking security rules is known as ?
Social Engineering
Oops!
Check
Okay!
Check
15
What is the term for a low-talent hacker who uses easy, well-known techniques to exploit Internet security vulnerabilities.
Script-Kiddie
Oops!
Check
Okay!
Check
15
A programmer that breaks into someone else's computer system without permission is called a ?
hacker
Oops!
Check
Okay!
Check
15
What does PuP stand for?
potentially unwanted programs
Oops!
Check
Okay!
Check
15
A piece of code that copies itself is called a ____________________.
Virus
Oops!
Check
Okay!
Check
15
Cyberbullying is especially harmful due to specific characteristics: Which of these is because it can't be easily seen or overheard by teachers and parents.
Discreet
Oops!
Check
Okay!
Check
monster
Reset all scores!
Oops!
gift
Win 5 points!
Okay!
gift
Win 20 points!
Okay!
baam
Lose 20 points!
Oops!
15
Cyberbullying is especially harmful due to specific characteristics: Which of these is because it contributes to the digital footprint of the victim and the bully.
Permanent
Oops!
Check
Okay!
Check
15
Which role of cyberbullying is described here: someone aware of cyberbullying and trying to break the cycle
upstander
Oops!
Check
Okay!
Check
heart
Other team wins 15 points!
Oops!
magnet
Take 5 points!
Okay!
fairy
Take points!
5
10
15
20
25
lifesaver
Give 15 points!
Oops!
15
A collection of remotely controlled bots that launch attacks are called:
Bot Network
Oops!
Check
Okay!
Check
15
What should you do if you are being bullied?
report the bully
Oops!
Check
Okay!
Check
15
Which of these is a secured site?
https
Oops!
Check
Okay!
Check
15
A software program that monitors your computer usage without your knowledge:
spyware
Oops!
Check
Okay!
Check
15
Security experts that hack systems professionally (and legally) are known as: