Search Header Logo

Cybersecurity mini

Authored by Caston Jackson

Computers

7th Grade

10 Questions

Used 4+ times

Cybersecurity mini
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a business email compromise?

An email scam in which fraudsters impersonate someone and ask to purchase gift cards for an event or prize, requesting the card number and PIN which allows the scammer to drain the card balance.

A fraudulent/fake email, often acing to be from a trusted source, meant to trick the recipient/reader into sharing sensitive information or clicking on a malicious link or attachment that installs malware.

A scam that tricks the victim into thinking his or her computer is infected with a virus/malware. The cybercriminal then offers the victim a solution that will 'fix' the bogus/fake problem.

'Piggybacking' into a secured area by following someone with authorized access. This in-person attack happens when the person with authorized access to the building is courteous enough to hold the door open for the person behind them.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

An email scam in which fraudsters impersonate someone and ask to purchase gift cards for an event or prize, requesting the card number and PIN which allows the scammer to drain the card balance.

A fraudulent/fake email, often acing to be from a trusted source, meant to trick the recipient/reader into sharing sensitive information or clicking on a malicious link or attachment that installs malware.

A scam that tricks the victim into thinking his or her computer is infected with a virus/malware. The cybercriminal then offers the victim a solution that will 'fix' the bogus/fake problem.

'Piggybacking' into a secured area by following someone with authorized access. This in-person attack happens when the person with authorized access to the building is courteous enough to hold the door open for the person behind them.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is scareware?

An email scam in which fraudsters impersonate someone and ask to purchase gift cards for an event or prize, requesting the card number and PIN which allows the scammer to drain the card balance.

A fraudulent/fake email, often acing to be from a trusted source, meant to trick the recipient/reader into sharing sensitive information or clicking on a malicious link or attachment that installs malware.

A scam that tricks the victim into thinking his or her computer is infected with a virus/malware. The cybercriminal then offers the victim a solution that will 'fix' the bogus/fake problem.

'Piggybacking' into a secured area by following someone with authorized access. This in-person attack happens when the person with authorized access to the building is courteous enough to hold the door open for the person behind them.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is tailgating?

An email scam in which fraudsters impersonate someone and ask to purchase gift cards for an event or prize, requesting the card number and PIN which allows the scammer to drain the card balance.

A fraudulent/fake email, often acing to be from a trusted source, meant to trick the recipient/reader into sharing sensitive information or clicking on a malicious link or attachment that installs malware.

A scam that tricks the victim into thinking his or her computer is infected with a virus/malware. The cybercriminal then offers the victim a solution that will 'fix' the bogus/fake problem.

'Piggybacking' into a secured area by following someone with authorized access. This in-person attack happens when the person with authorized access to the building is courteous enough to hold the door open for the person behind them.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is smishing?

An email scam in which fraudsters impersonate someone and ask to purchase gift cards for an event or prize, requesting the card number and PIN which allows the scammer to drain the card balance.

A form of phishing targeted at a specific individual or organization.

A scam that tricks the victim into thinking his or her computer is infected with a virus/malware. The cybercriminal then offers the victim a solution that will 'fix' the bogus/fake problem.

A fraudulent/fake message sent via text message.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is spear phishing?

An email scam in which fraudsters impersonate someone and ask to purchase gift cards for an event or prize, requesting the card number and PIN which allows the scammer to drain the card balance.

A form of phishing targeted at a specific individual or organization.

A scam that tricks the victim into thinking his or her computer is infected with a virus/malware. The cybercriminal then offers the victim a solution that will 'fix' the bogus/fake problem.

A fraudulent/fake message sent via text message.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is ransomware?

An email scam in which fraudsters impersonate someone and ask to purchase gift cards for an event or prize, requesting the card number and PIN which allows the scammer to drain the card balance.

A form of phishing targeted at a specific individual or organization.

a type of malware used to infect computers and encrypt files until a ransom is paid

A fraudulent/fake message sent via text message.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers