
Cybercrime Threats Quiz

Quiz
•
Computers
•
11th Grade
•
Medium
Liam Dunphy
Used 1+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Luke is working on a project to improve the cybersecurity measures of his company.
How are cybercrime threats categorised with respect to an enterprise?
Internal and external threats
Social and economic threats
Technological and environmental threats
Domestic and international threats
Answer explanation
Cybercrime threats are categorized as internal and external threats. Internal threats come from within the organization, while external threats originate from outside, making this the most relevant classification for enterprises.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
During a cybersecurity class, Cie asked,
"What distinguishes botnets from individual bots?"
Bots primarily target personal computers, whereas botnets target corporate networks
Botnets consist of a network of interconnected bots, while bots function individually
Bots are used for malicious purposes, whereas botnets are typically benign
There is no difference between them
Answer explanation
Botnets are networks of multiple bots working together, while individual bots operate alone. This distinction highlights the collective nature of botnets compared to the singular function of bots.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Toby received an email that appeared to be from his bank,
asking him to verify his account details.
Which cybercrime threat involves criminal activities aimed at
deceiving people for financial gain or identity theft?
Hacking
Phishing
Botnets
Scamming
Answer explanation
The correct answer is 'Scamming' as it refers to deceptive practices aimed at financial gain or identity theft, like the email Toby received, which is a classic example of phishing.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Ed received an email that appeared to be from his company's IT department,
asking him to verify his login details.
What distinguishes this spear phishing attempt from traditional phishing cyber threats?
Spear phishing involves sending emails to random recipients
Spear phishing focuses on stealing personal data only
Spear phishing targets specific individuals or groups within an organisation
Spear phishing relies solely on phone calls for communication
Answer explanation
Spear phishing specifically targets individuals or groups within an organization, making it more personalized and deceptive than traditional phishing, which sends generic emails to random recipients.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
How can employees like Arque and Luke contribute to cybersecurity vulnerabilities within an enterprise?
By using weak, easily guessable passwords
By storing sensitive data on unsecured devices
By using personal devices for work without the necessary security measures
All are correct
Answer explanation
Employees like Arque and Luke can contribute to cybersecurity vulnerabilities by using weak passwords, storing sensitive data on unsecured devices, and using personal devices without proper security. Therefore, all are correct.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
During a cybersecurity class, Luke asked,
'What is the word ‘Malware’ an abbreviation of?'
Malicious software
Malfunctioning software
Malfunctioning hardware
Malicious hardware
Answer explanation
The term 'Malware' is short for 'Malicious software', which refers to software designed to harm, exploit, or otherwise compromise computer systems. The other options do not accurately describe malware.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Kye is setting up a new website for his online store.
Which of the following is a characteristic of a bot used for customer service on his website?
It can perform complex financial transactions
It can provide automated answers to Frequently Asked Questions
It requires human intervention for each interaction
It requires human intervention only every so often
Answer explanation
The correct choice is that a bot can provide automated answers to Frequently Asked Questions. This characteristic allows it to assist customers efficiently without needing constant human intervention.
Create a free account and access millions of resources
Similar Resources on Wayground
21 questions
Data protection

Quiz
•
9th - 11th Grade
17 questions
Protocols Quiz

Quiz
•
11th Grade
15 questions
Global Connectivity Quiz

Quiz
•
9th - 12th Grade
15 questions
Quiz on Security, Privacy, and Data Integrity

Quiz
•
11th Grade
15 questions
Security IV

Quiz
•
11th Grade
15 questions
Networks Quiz

Quiz
•
11th Grade
15 questions
cybersecurity hackers

Quiz
•
11th Grade
15 questions
Security III

Quiz
•
11th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade
19 questions
AP CSP Unit 1 Review (code.org)

Quiz
•
10th - 12th Grade