Page 90 - Cyber Safety C-5
P. 90

21 st
                                            IDENTIFY THE TYPE OF HACKING                        Century   #Information
                                                                                                 Skills  Literacy

                  Read each scenario below and identify which type of hacking it represents. Choose the correct

                  answer from the options provided.

                  1.   A hacker locks your files and demands money to unlock them, telling you not to try to access

                     your files until you pay.

                             (i)  Ransomware                       (ii)  Public Wi-Fi Hacking


                             (iii)  SQL Injection                  (iv)  Password Cracking


                  2.   A  hacker  tries  to  log in  to  your  email  account  but  struggles.  After  several attempts,  he
                     successfully accesses the account. What is this called?

                             (i)  Password Cracking                (ii)  Man-in-the-Middle (MITM) Attack



                             (iii)  App-Based Hacking              (iv)  Public Wi-Fi Hacking


                  3.   Mansi downloaded a free game from an unknown website. After that, her files started getting
                     damaged. What type of attack is this?

                             (i)  Phishing                         (ii)  Password Cracking


                             (iii)  Malware Attack                 (iv)  DoS



                  4.   A website suddenly becomes very slow because too many requests are sent at the same time.
                     What type of attack is this?

                             (i)  Ransomware                       (ii)  Denial of Service (DoS)


                             (iii)  Phishing                       (iv)  Password Cracking


                  5.   Sana clicked on a link in a message that said, “Update your phone now.” After clicking it,

                     someone accessed her private chats and photos.What type of hacking is this?

                             (i)  Ransomware                       (ii)  Mobile Hacking


                             (iii)  DoS                            (iv)  Phishing








                   88   Computer Science - V
   85   86   87   88   89   90   91   92   93   94   95