Understanding Cyber Crime

Understanding Cyber Crime

12th Grade

10 Qs

quiz-placeholder

Similar activities

Ethos, Pathos, Logos

Ethos, Pathos, Logos

6th - 12th Grade

10 Qs

Scientific Method

Scientific Method

8th - 12th Grade

15 Qs

Unit Vocab Review

Unit Vocab Review

12th Grade

10 Qs

Cyber security

Cyber security

12th Grade

13 Qs

Can You Spot a Scam

Can You Spot a Scam

2nd Grade - University

15 Qs

online safety

online safety

9th - 12th Grade

10 Qs

Ethos, Pathos, Logos

Ethos, Pathos, Logos

9th - 12th Grade

15 Qs

Don't Feed the Phish

Don't Feed the Phish

3rd Grade - University

15 Qs

Understanding Cyber Crime

Understanding Cyber Crime

Assessment

Quiz

English

12th Grade

Easy

Created by

Jay Damazie

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the correct definition of a 'hacker'?

A method for data encryption

A person who illegally accesses computer systems

A type of computer hardware

A person who creates software

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does 'extortion' mean?

d) Selling stolen goods

e) Threatening to reveal personal secrets

c) Obtaining something by threatening someone

c) Taking money from a bank account

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which word describes 'unwanted email advertisements'?

Spam

Spyware

Malware

Phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a 'scam'?

A legal business operation

A type of investment strategy

A method for online shopping

b) An illegal plan to make money

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the article, how many new types of malicious programs were launched in the past two months?

750,000

2.5 million

3 million

250,000

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a phishing attack?

a) To steal personal information

To conduct social engineering attacks

To enhance security measures

To gather marketing data

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common method used by hackers?

a) Social engineering

Password cracking

Phishing attacks

Malware development

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?