Search Header Logo

Understanding Cyber Crime Scenarios

Authored by Geetha Chenpagapandian

Professional Development

Professional Development

Used 1+ times

Understanding Cyber Crime Scenarios
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a ransomware attack?

A ransomware attack is a type of malware that speeds up computer performance.

A ransomware attack is a phishing attempt to steal personal information.

A ransomware attack is a method of backing up data securely.

A ransomware attack is a cyber attack that encrypts a victim's data and demands payment for decryption.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does ransomware typically spread?

Ransomware spreads through phishing emails, malicious downloads, and network vulnerabilities.

Ransomware spreads through social media posts.

Ransomware can only infect devices with outdated software.

Ransomware is only spread via USB drives.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are common targets for ransomware attacks?

Retail businesses

Educational institutions

Non-profit organizations

Healthcare providers, financial institutions, government agencies, large corporations

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What steps can individuals take to prevent ransomware?

Regularly back up data, keep software updated, use strong passwords, enable two-factor authentication, avoid suspicious links, and use antivirus software.

Click on all email links without checking

Use the same password for all accounts

Ignore software updates

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Define identity theft in your own words.

Using someone else's information for legal purposes.

Sharing personal information with friends and family.

Creating a new identity for personal use.

Identity theft is the unauthorized use of someone else's personal information for fraudulent activities.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some common methods used in identity theft?

Common methods used in identity theft include phishing, data breaches, and skimming.

Regularly updating software

Using strong passwords

Monitoring bank statements

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can victims of identity theft protect themselves?

Sharing personal information on social media

Ignoring all financial statements

Victims can protect themselves by monitoring credit reports, placing fraud alerts, using strong passwords, enabling two-factor authentication, and reporting suspicious activity.

Using the same password for all accounts

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?