
Understanding Cyber Crime Scenarios
Authored by Geetha Chenpagapandian
Professional Development
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a ransomware attack?
A ransomware attack is a type of malware that speeds up computer performance.
A ransomware attack is a phishing attempt to steal personal information.
A ransomware attack is a method of backing up data securely.
A ransomware attack is a cyber attack that encrypts a victim's data and demands payment for decryption.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does ransomware typically spread?
Ransomware spreads through phishing emails, malicious downloads, and network vulnerabilities.
Ransomware spreads through social media posts.
Ransomware can only infect devices with outdated software.
Ransomware is only spread via USB drives.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are common targets for ransomware attacks?
Retail businesses
Educational institutions
Non-profit organizations
Healthcare providers, financial institutions, government agencies, large corporations
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What steps can individuals take to prevent ransomware?
Regularly back up data, keep software updated, use strong passwords, enable two-factor authentication, avoid suspicious links, and use antivirus software.
Click on all email links without checking
Use the same password for all accounts
Ignore software updates
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Define identity theft in your own words.
Using someone else's information for legal purposes.
Sharing personal information with friends and family.
Creating a new identity for personal use.
Identity theft is the unauthorized use of someone else's personal information for fraudulent activities.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are some common methods used in identity theft?
Common methods used in identity theft include phishing, data breaches, and skimming.
Regularly updating software
Using strong passwords
Monitoring bank statements
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can victims of identity theft protect themselves?
Sharing personal information on social media
Ignoring all financial statements
Victims can protect themselves by monitoring credit reports, placing fraud alerts, using strong passwords, enabling two-factor authentication, and reporting suspicious activity.
Using the same password for all accounts
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?