Search Header Logo
IT Cyber TED Talk

IT Cyber TED Talk

Assessment

Interactive Video

Computers

9th - 12th Grade

Practice Problem

Hard

Created by

Amy Austin

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many records were lost or stolen this year due to cybercrime?

Over 100 million

Over 500 million

Over 1 billion

Over 2 billion

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What percentage of cybercrime is estimated to originate from highly organized criminal gangs?

20%

50%

80%

100%

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the estimated annual illegal profit from cybercrime?

$100 billion

$250 billion

$445 billion

$1 trillion

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How did the Dire Wolf banking trojan typically steal money?

By directly hacking into bank servers.

By encrypting user files and demanding a ransom.

By tricking users into clicking a phishing link, then stealing credentials when they log into their bank.

By physically installing hardware on the user's computer.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the speaker's reaction to the "legally binding agreement" on the fake ID website?

He found it to be a legitimate attempt at legal protection.

He was amused by the absurdity of the claim.

He believed it would deter potential buyers.

He thought it was a clever way to avoid prosecution.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why did the author of Bilal Botnet contact the security researcher?

To threaten legal action for defamation.

To offer a partnership for improving the malware.

To correct outdated information about their malware.

To demand payment for using their malware's name.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does the speaker describe the difference in response between healthcare pandemics and cyberattacks?

Healthcare responses are slow and uncoordinated, while cyberattack responses are rapid.

Healthcare responses prioritize individual privacy, while cyberattack responses prioritize public safety.

Healthcare responses involve open, collective sharing of information, unlike cyberattack responses.

Healthcare responses focus on prevention, while cyberattack responses focus on prosecution.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?