Search Header Logo

Cyber Crime

Authored by Jithin George

Information Technology (IT)

Professional Development

Used 3+ times

Cyber Crime
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Avni and her friends often download music, software, games, and videos from unauthorized sources.

Phishing

Vishing

Malware

Ransomware

Piracy

Answer explanation

The question refers to the illegal production and consumption of digital content, which is defined as piracy. Other options like phishing and malware relate to different types of cybercrime, not specifically to the unauthorized use of media.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Aarush was working on an important project on his laptop when suddenly a message appeared on the screen, stating that his files were locked and he couldn't access them until a ransom was paid.

Phishing

Vishing

Malware

Ransomware

Piracy

Answer explanation

Ransomware is a type of malware that locks users out of their devices until a ransom is paid. It specifically targets access to systems, making it the correct choice for this question.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Nikita received a phone call from someone claiming to be from her bank.

They asked her to verify her account information,

suggesting that there had been suspicious activity.

However, it was actually an act of using the telephone in an attempt to scam

her into surrendering private information

that would be used for identity theft.

Phishing

Vishing

Malware

Ransomware

Piracy

Answer explanation

The act described involves using the telephone to deceive someone into providing personal information, which is specifically known as vishing (voice phishing). This distinguishes it from other types of scams like phishing or malware.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

While browsing the internet, Tara noticed that a popular shopping website was behaving strangely. The website's traffic seemed manipulated, and soon after, her confidential information was stolen.

Phishing

Vishing

Malware

Ransomware

Piracy

Answer explanation

Phishing involves manipulating website traffic to steal confidential information, making it the correct choice. Vishing, malware, ransomware, and piracy do not specifically focus on traffic manipulation and information theft in this context.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

While working on a group project, Kiara discovered software designed with the intent to disrupt, damage, or gain

unauthorized access to a computer system.

Phishing

Vishing

Malware

Ransomware

Piracy

Answer explanation

Malware is software specifically created to disrupt, damage, or gain unauthorized access to computer systems. Other options like phishing and vishing involve deception but do not fit the definition of software designed for harm.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?