
Cyber Crime
Authored by Jithin George
Information Technology (IT)
Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Avni and her friends often download music, software, games, and videos from unauthorized sources.
Phishing
Vishing
Malware
Ransomware
Piracy
Answer explanation
The question refers to the illegal production and consumption of digital content, which is defined as piracy. Other options like phishing and malware relate to different types of cybercrime, not specifically to the unauthorized use of media.
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Aarush was working on an important project on his laptop when suddenly a message appeared on the screen, stating that his files were locked and he couldn't access them until a ransom was paid.
Phishing
Vishing
Malware
Ransomware
Piracy
Answer explanation
Ransomware is a type of malware that locks users out of their devices until a ransom is paid. It specifically targets access to systems, making it the correct choice for this question.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Nikita received a phone call from someone claiming to be from her bank.
They asked her to verify her account information,
suggesting that there had been suspicious activity.
However, it was actually an act of using the telephone in an attempt to scam
her into surrendering private information
that would be used for identity theft.
Phishing
Vishing
Malware
Ransomware
Piracy
Answer explanation
The act described involves using the telephone to deceive someone into providing personal information, which is specifically known as vishing (voice phishing). This distinguishes it from other types of scams like phishing or malware.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
While browsing the internet, Tara noticed that a popular shopping website was behaving strangely. The website's traffic seemed manipulated, and soon after, her confidential information was stolen.
Phishing
Vishing
Malware
Ransomware
Piracy
Answer explanation
Phishing involves manipulating website traffic to steal confidential information, making it the correct choice. Vishing, malware, ransomware, and piracy do not specifically focus on traffic manipulation and information theft in this context.
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
While working on a group project, Kiara discovered software designed with the intent to disrupt, damage, or gain
unauthorized access to a computer system.
Phishing
Vishing
Malware
Ransomware
Piracy
Answer explanation
Malware is software specifically created to disrupt, damage, or gain unauthorized access to computer systems. Other options like phishing and vishing involve deception but do not fit the definition of software designed for harm.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?