J808 LO4 Threats Recap

J808 LO4 Threats Recap

7th - 11th Grade

30 Qs

quiz-placeholder

Similar activities

11° INFORMATICA 2023

11° INFORMATICA 2023

11th Grade

25 Qs

Plagiarism

Plagiarism

7th - 10th Grade

25 Qs

ÔN TẬP KIỂM TRA THƯỜNG XUYÊN KỲ 2

ÔN TẬP KIỂM TRA THƯỜNG XUYÊN KỲ 2

11th Grade

26 Qs

Revision hardware, Input,Output,Main Memory, Storage, Processing

Revision hardware, Input,Output,Main Memory, Storage, Processing

11th Grade

25 Qs

ASK T3-UJIAN AKHIR TAHUN

ASK T3-UJIAN AKHIR TAHUN

9th Grade

25 Qs

EXAMEN-PRIMER-TRIMESTRE-TECNOLOGÍAS-1-12-11-2020

EXAMEN-PRIMER-TRIMESTRE-TECNOLOGÍAS-1-12-11-2020

7th Grade

25 Qs

Storage Hardware and Software

Storage Hardware and Software

9th - 10th Grade

25 Qs

Network Threat Prevention 2

Network Threat Prevention 2

8th - 10th Grade

25 Qs

J808 LO4 Threats Recap

J808 LO4 Threats Recap

Assessment

Quiz

Computers

7th - 11th Grade

Practice Problem

Medium

Created by

Rachel Pugh

Used 37+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Using a person’s name or personal information without permission to make purchases or get loans is called

fraud.

acting.

identity theft.

impersonation.

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

People who attempt to swindle or trick you into illegal schemes are commonly called

schemers.

con artists.

film flames.

embezzlers.

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following steps would help reduce your potential of being a victim of consumer fraud?

Delete all e-mails asking for personal information without responding to them.

Go along with a scheme so you get more information and then report it to local law enforcement officials.

If you get a special offer in the mail, send cash so they cannot get your personal information from a check or credit card.

Give your best friends your personal information, like your Social

Security number and bank account number(s), in case anything happens to you.

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

The MOST secure password for Internet or other uses should include

your first name or birthday.

a series of letters than mean nothing.

your Social Security number.

a combination of numbers and letters.

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following is NOT a good way to protect yourself from being a fraud victim?

Enter your personal information on a Web site so you can get more information before deciding on an investment.

Take time to do careful research before giving money or personal information.

Avoid letting emotions interfere with financial decisions.

Get all information in writing before giving money or personal information.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is the most appropriate definition of a hacker?

Is someone who gains unauthorised access to an IT system such as a computer, website or email account.
Someone who accesses your home without your permission.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by the term 'white hat hacker'?

Illegal hacker – intent on doing harm, stealing for personal gain e.g. taking credit card details.
Doesn’t necessarily steal but may access IT systems without permission which is still illegal.
Ethical hacker – paid by companies to test their systems fro vulnerabilities.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?