Search Header Logo

Computer Crime and Cyber security

Authored by Mike Smith

Computers

9th - 11th Grade

Used 273+ times

Computer Crime and Cyber security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A phishing email is one which

requests a payment for goods you have not received
offers you products in which you may have no interest
encourages you to click on a link to a fraudulent website
contains abusive and threatening language

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If you receive an email from a well-known company, but its name is misspelt in the sender’s address, you should:

click on the link in the email to check if it’s genuine
reply, pointing out the error
report it as a possible phishing scam
forward the email to a friend to check

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A fraudulent email which is trying to obtain your username and password for a particular site will typically:

have a heading with a logo which appears genuine
address you by name
offer large sums of money
appear to come from a friend

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You can tell whether a link in email will take you to a genuine website, for example belonging to a bank, without risk, by:

pointing to the link without clicking
deleting the email
replying to the email
clicking on the link

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking is illegal under:

The Data Protection Act
The Computer Misuse Act 
Copyright Law
Health and Safety Law

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive a desperate plea for help from a friend who says they are stuck overseas and all their money has been stolen. You should:

reply to the email
delete the email
send some money
forward the email to a mutual friend

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gaining unauthorised access to someone else’s computer files is known as:

copyright infringement
hacking
virus attack
data theft

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?