Search Header Logo

J808 LO4 Threats Recap

Authored by Rachel Pugh

Computers

7th - 11th Grade

Used 37+ times

J808 LO4 Threats Recap
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Using a person’s name or personal information without permission to make purchases or get loans is called

fraud.

acting.

identity theft.

impersonation.

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

People who attempt to swindle or trick you into illegal schemes are commonly called

schemers.

con artists.

film flames.

embezzlers.

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following steps would help reduce your potential of being a victim of consumer fraud?

Delete all e-mails asking for personal information without responding to them.

Go along with a scheme so you get more information and then report it to local law enforcement officials.

If you get a special offer in the mail, send cash so they cannot get your personal information from a check or credit card.

Give your best friends your personal information, like your Social

Security number and bank account number(s), in case anything happens to you.

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

The MOST secure password for Internet or other uses should include

your first name or birthday.

a series of letters than mean nothing.

your Social Security number.

a combination of numbers and letters.

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following is NOT a good way to protect yourself from being a fraud victim?

Enter your personal information on a Web site so you can get more information before deciding on an investment.

Take time to do careful research before giving money or personal information.

Avoid letting emotions interfere with financial decisions.

Get all information in writing before giving money or personal information.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is the most appropriate definition of a hacker?

Is someone who gains unauthorised access to an IT system such as a computer, website or email account.
Someone who accesses your home without your permission.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by the term 'white hat hacker'?

Illegal hacker – intent on doing harm, stealing for personal gain e.g. taking credit card details.
Doesn’t necessarily steal but may access IT systems without permission which is still illegal.
Ethical hacker – paid by companies to test their systems fro vulnerabilities.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?