Page 90 - Cyber Safety C-5
P. 90
21 st
IDENTIFY THE TYPE OF HACKING Century #Information
Skills Literacy
Read each scenario below and identify which type of hacking it represents. Choose the correct
answer from the options provided.
1. A hacker locks your files and demands money to unlock them, telling you not to try to access
your files until you pay.
(i) Ransomware (ii) Public Wi-Fi Hacking
(iii) SQL Injection (iv) Password Cracking
2. A hacker tries to log in to your email account but struggles. After several attempts, he
successfully accesses the account. What is this called?
(i) Password Cracking (ii) Man-in-the-Middle (MITM) Attack
(iii) App-Based Hacking (iv) Public Wi-Fi Hacking
3. Mansi downloaded a free game from an unknown website. After that, her files started getting
damaged. What type of attack is this?
(i) Phishing (ii) Password Cracking
(iii) Malware Attack (iv) DoS
4. A website suddenly becomes very slow because too many requests are sent at the same time.
What type of attack is this?
(i) Ransomware (ii) Denial of Service (DoS)
(iii) Phishing (iv) Password Cracking
5. Sana clicked on a link in a message that said, “Update your phone now.” After clicking it,
someone accessed her private chats and photos.What type of hacking is this?
(i) Ransomware (ii) Mobile Hacking
(iii) DoS (iv) Phishing
88 Computer Science - V

