Year 8 - Cyber Crime and Cyber Security Assessment

Year 8 - Cyber Crime and Cyber Security Assessment

7th Grade

39 Qs

quiz-placeholder

Similar activities

Computer Basics K. Robinson

Computer Basics K. Robinson

7th - 8th Grade

43 Qs

ICT - Revision

ICT - Revision

5th - 8th Grade

40 Qs

Computers and Social Media: The Good, The Bad and The Ugly.

Computers and Social Media: The Good, The Bad and The Ugly.

7th - 9th Grade

40 Qs

Data Security terms

Data Security terms

6th - 12th Grade

40 Qs

Information Security Quiz

Information Security Quiz

7th Grade

40 Qs

Lights and Drums Starter

Lights and Drums Starter

7th Grade

35 Qs

Computer Exam Term 1

Computer Exam Term 1

7th Grade

40 Qs

GCSE ICT U1 Topics 1-6 Revision

GCSE ICT U1 Topics 1-6 Revision

5th - 9th Grade

36 Qs

Year 8 - Cyber Crime and Cyber Security Assessment

Year 8 - Cyber Crime and Cyber Security Assessment

Assessment

Quiz

Computers

7th Grade

Hard

Created by

D Hesketh

Used 145+ times

FREE Resource

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A phishing email is one which:

requests a payment for goods you have not received

offers you products in which you may have no interest

encourages you to click on a link to a fraudulent website

contains abusive and threatening language

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If you receive an email from a well-known company, but its name is misspelt in the sender’s address, you should:

click on the link in the email to check if it’s genuine

reply, pointing out the error

report it as a possible phishing scam

forward the email to a friend to check

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A fraudulent email which is trying to obtain your username and password for a particular site will typically:

have a heading with a logo which appears genuine

address you by name

offer large sums of money

appear to come from a friend

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You can tell whether a link in email will take you to a genuine website, for example belonging to a bank, without risk, by:

pointing to the link or hovering over it without clicking

deleting the email

replying to the email

clicking on the link

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking is illegal under:

The Data Protection Act

The Computer Misuse Act

Copyright Law

Health and Safety Law

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive a desperate plea for help from a friend who says they are stuck overseas and all their money has been stolen. You should:

reply to the email

delete the email

send some money

forward the email to a mutual friend

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gaining unauthorised access to someone else’s computer files is known as:

copyright infringement

hacking

virus attack

data theft

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?