Cybersecurity mini

Cybersecurity mini

7th Grade

10 Qs

quiz-placeholder

Similar activities

Safe Computing & Web Browser Review

Safe Computing & Web Browser Review

6th - 8th Grade

15 Qs

Malware

Malware

7th - 11th Grade

15 Qs

Y8 Malware

Y8 Malware

7th Grade

10 Qs

Phishing and passwords

Phishing and passwords

7th Grade

12 Qs

E-safety

E-safety

6th - 12th Grade

10 Qs

Ciberseguridad Medidas de proyección y prevención.

Ciberseguridad Medidas de proyección y prevención.

1st - 12th Grade

10 Qs

CyberSecurity Lesson 4

CyberSecurity Lesson 4

6th - 8th Grade

13 Qs

Computer Malware

Computer Malware

6th - 8th Grade

11 Qs

Cybersecurity mini

Cybersecurity mini

Assessment

Quiz

Computers

7th Grade

Hard

Created by

Caston Jackson

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a business email compromise?

An email scam in which fraudsters impersonate someone and ask to purchase gift cards for an event or prize, requesting the card number and PIN which allows the scammer to drain the card balance.

A fraudulent/fake email, often acing to be from a trusted source, meant to trick the recipient/reader into sharing sensitive information or clicking on a malicious link or attachment that installs malware.

A scam that tricks the victim into thinking his or her computer is infected with a virus/malware. The cybercriminal then offers the victim a solution that will 'fix' the bogus/fake problem.

'Piggybacking' into a secured area by following someone with authorized access. This in-person attack happens when the person with authorized access to the building is courteous enough to hold the door open for the person behind them.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

An email scam in which fraudsters impersonate someone and ask to purchase gift cards for an event or prize, requesting the card number and PIN which allows the scammer to drain the card balance.

A fraudulent/fake email, often acing to be from a trusted source, meant to trick the recipient/reader into sharing sensitive information or clicking on a malicious link or attachment that installs malware.

A scam that tricks the victim into thinking his or her computer is infected with a virus/malware. The cybercriminal then offers the victim a solution that will 'fix' the bogus/fake problem.

'Piggybacking' into a secured area by following someone with authorized access. This in-person attack happens when the person with authorized access to the building is courteous enough to hold the door open for the person behind them.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is scareware?

An email scam in which fraudsters impersonate someone and ask to purchase gift cards for an event or prize, requesting the card number and PIN which allows the scammer to drain the card balance.

A fraudulent/fake email, often acing to be from a trusted source, meant to trick the recipient/reader into sharing sensitive information or clicking on a malicious link or attachment that installs malware.

A scam that tricks the victim into thinking his or her computer is infected with a virus/malware. The cybercriminal then offers the victim a solution that will 'fix' the bogus/fake problem.

'Piggybacking' into a secured area by following someone with authorized access. This in-person attack happens when the person with authorized access to the building is courteous enough to hold the door open for the person behind them.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is tailgating?

An email scam in which fraudsters impersonate someone and ask to purchase gift cards for an event or prize, requesting the card number and PIN which allows the scammer to drain the card balance.

A fraudulent/fake email, often acing to be from a trusted source, meant to trick the recipient/reader into sharing sensitive information or clicking on a malicious link or attachment that installs malware.

A scam that tricks the victim into thinking his or her computer is infected with a virus/malware. The cybercriminal then offers the victim a solution that will 'fix' the bogus/fake problem.

'Piggybacking' into a secured area by following someone with authorized access. This in-person attack happens when the person with authorized access to the building is courteous enough to hold the door open for the person behind them.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is smishing?

An email scam in which fraudsters impersonate someone and ask to purchase gift cards for an event or prize, requesting the card number and PIN which allows the scammer to drain the card balance.

A form of phishing targeted at a specific individual or organization.

A scam that tricks the victim into thinking his or her computer is infected with a virus/malware. The cybercriminal then offers the victim a solution that will 'fix' the bogus/fake problem.

A fraudulent/fake message sent via text message.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is spear phishing?

An email scam in which fraudsters impersonate someone and ask to purchase gift cards for an event or prize, requesting the card number and PIN which allows the scammer to drain the card balance.

A form of phishing targeted at a specific individual or organization.

A scam that tricks the victim into thinking his or her computer is infected with a virus/malware. The cybercriminal then offers the victim a solution that will 'fix' the bogus/fake problem.

A fraudulent/fake message sent via text message.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is ransomware?

An email scam in which fraudsters impersonate someone and ask to purchase gift cards for an event or prize, requesting the card number and PIN which allows the scammer to drain the card balance.

A form of phishing targeted at a specific individual or organization.

a type of malware used to infect computers and encrypt files until a ransom is paid

A fraudulent/fake message sent via text message.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?