
5-1a Cybercrime
Authored by KEDRAL TIMMONS
Computers
9th - 12th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
An intentional breach to digital security often involves a ___________ act that is against the law.
deliberate
accidential
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Any illegal act involving the use of a computer or related devices generally is referred to as a ___________.
computer crime
cybercrime
hacker
3.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
The term _______ refers to online or Internet-based illegal acts such as distributing malicious software or committing identity theft.
cybercrime
computer crime
hacker
4.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
The term _______, although originally a complimentary word for a computer enthusiast, now has a derogatory meaning and refers to someone who accesses a computer or network illegally.
hacker
script kiddie
cybercrime
5.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology __________.
infrastructure
pool form
breach security
6.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
A _______ is someone who uses the Internet or network to destroy or damage computers for political reasons.
cyberterrorist
cyberextortionist
7.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
The term, cyberwarfare, describes an attack whose goal ranges from disabling a __________ computer network to crippling a country.
government's
university's
military's
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?