Cybersecurity mini

Cybersecurity mini

7th Grade

10 Qs

quiz-placeholder

Similar activities

Unit 1 Year 8 Q and A

Unit 1 Year 8 Q and A

7th Grade

14 Qs

Cyber Crime Lesson 1

Cyber Crime Lesson 1

7th Grade

10 Qs

ENCRYPTION AND CYBERCRIME

ENCRYPTION AND CYBERCRIME

7th - 10th Grade

15 Qs

CyberSecurity

CyberSecurity

6th Grade - Professional Development

10 Qs

Don't Fall for Fake

Don't Fall for Fake

5th - 8th Grade

10 Qs

Computer Virus

Computer Virus

6th - 8th Grade

10 Qs

Staying safe online 4: malware and phishing

Staying safe online 4: malware and phishing

7th Grade

13 Qs

How to Avoid Scams on the Internet Quiz

How to Avoid Scams on the Internet Quiz

6th - 8th Grade

10 Qs

Cybersecurity mini

Cybersecurity mini

Assessment

Quiz

Computers

7th Grade

Hard

Created by

Caston Jackson

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a business email compromise?

An email scam in which fraudsters impersonate someone and ask to purchase gift cards for an event or prize, requesting the card number and PIN which allows the scammer to drain the card balance.

A fraudulent/fake email, often acing to be from a trusted source, meant to trick the recipient/reader into sharing sensitive information or clicking on a malicious link or attachment that installs malware.

A scam that tricks the victim into thinking his or her computer is infected with a virus/malware. The cybercriminal then offers the victim a solution that will 'fix' the bogus/fake problem.

'Piggybacking' into a secured area by following someone with authorized access. This in-person attack happens when the person with authorized access to the building is courteous enough to hold the door open for the person behind them.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

An email scam in which fraudsters impersonate someone and ask to purchase gift cards for an event or prize, requesting the card number and PIN which allows the scammer to drain the card balance.

A fraudulent/fake email, often acing to be from a trusted source, meant to trick the recipient/reader into sharing sensitive information or clicking on a malicious link or attachment that installs malware.

A scam that tricks the victim into thinking his or her computer is infected with a virus/malware. The cybercriminal then offers the victim a solution that will 'fix' the bogus/fake problem.

'Piggybacking' into a secured area by following someone with authorized access. This in-person attack happens when the person with authorized access to the building is courteous enough to hold the door open for the person behind them.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is scareware?

An email scam in which fraudsters impersonate someone and ask to purchase gift cards for an event or prize, requesting the card number and PIN which allows the scammer to drain the card balance.

A fraudulent/fake email, often acing to be from a trusted source, meant to trick the recipient/reader into sharing sensitive information or clicking on a malicious link or attachment that installs malware.

A scam that tricks the victim into thinking his or her computer is infected with a virus/malware. The cybercriminal then offers the victim a solution that will 'fix' the bogus/fake problem.

'Piggybacking' into a secured area by following someone with authorized access. This in-person attack happens when the person with authorized access to the building is courteous enough to hold the door open for the person behind them.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is tailgating?

An email scam in which fraudsters impersonate someone and ask to purchase gift cards for an event or prize, requesting the card number and PIN which allows the scammer to drain the card balance.

A fraudulent/fake email, often acing to be from a trusted source, meant to trick the recipient/reader into sharing sensitive information or clicking on a malicious link or attachment that installs malware.

A scam that tricks the victim into thinking his or her computer is infected with a virus/malware. The cybercriminal then offers the victim a solution that will 'fix' the bogus/fake problem.

'Piggybacking' into a secured area by following someone with authorized access. This in-person attack happens when the person with authorized access to the building is courteous enough to hold the door open for the person behind them.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is smishing?

An email scam in which fraudsters impersonate someone and ask to purchase gift cards for an event or prize, requesting the card number and PIN which allows the scammer to drain the card balance.

A form of phishing targeted at a specific individual or organization.

A scam that tricks the victim into thinking his or her computer is infected with a virus/malware. The cybercriminal then offers the victim a solution that will 'fix' the bogus/fake problem.

A fraudulent/fake message sent via text message.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is spear phishing?

An email scam in which fraudsters impersonate someone and ask to purchase gift cards for an event or prize, requesting the card number and PIN which allows the scammer to drain the card balance.

A form of phishing targeted at a specific individual or organization.

A scam that tricks the victim into thinking his or her computer is infected with a virus/malware. The cybercriminal then offers the victim a solution that will 'fix' the bogus/fake problem.

A fraudulent/fake message sent via text message.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is ransomware?

An email scam in which fraudsters impersonate someone and ask to purchase gift cards for an event or prize, requesting the card number and PIN which allows the scammer to drain the card balance.

A form of phishing targeted at a specific individual or organization.

a type of malware used to infect computers and encrypt files until a ransom is paid

A fraudulent/fake message sent via text message.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?