Cyber crime quiz

Cyber crime quiz

11th Grade

11 Qs

quiz-placeholder

Similar activities

Bảo mật mạng

Bảo mật mạng

11th Grade

10 Qs

BTEC DIT C3 B1 - Threats to Data

BTEC DIT C3 B1 - Threats to Data

11th Grade

11 Qs

Network Security - Phishing & Social Engineering

Network Security - Phishing & Social Engineering

8th - 11th Grade

11 Qs

C5- Managing computing securely, safely and ethically

C5- Managing computing securely, safely and ethically

11th Grade

10 Qs

Hackers

Hackers

9th - 12th Grade

10 Qs

Cybersecurity Online Threats

Cybersecurity Online Threats

9th - 12th Grade

12 Qs

ICT

ICT

9th - 11th Grade

15 Qs

KUIS KEAMANAN JARINGAN

KUIS KEAMANAN JARINGAN

11th Grade

10 Qs

Cyber crime quiz

Cyber crime quiz

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Panther Panther

Used 2+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Name one Cyber crime that uses a computer network to advance to other criminal activities

Murder

Suicide

Phishing

Dos attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a cyber crime

Trolling the congress on social Media

Threatening people on Omegle

Any Criminal activity that involves a computer or a networked device

Yashwardan

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Hacking is the act of ________digital devices and networks by gaining unauthorised access to an account or computer system.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following can be example of ethical hacking

Hacking to sell private material to others

Hacking to Cheat in video games

Hacking to troll people on instagram

Hacking to detect potential data breaches and threats in a network

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the types of hacking

PubG Hacking

Online hacking

Ethical hacking

Non Ethical Hacking

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the types of hackers

Adil

Grey Hat

White hat

Black hat

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When can an user most likely experience eavesdropping

When the User is arrested for a crime

When The user goes to a cyber cafe

When the user connects to a network whose traffic may not be secured or encrypted

When a user is playing chess

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?