Cyber crime and security

Cyber crime and security

6th - 8th Grade

18 Qs

quiz-placeholder

Similar activities

cyber security

cyber security

KG - Professional Development

14 Qs

Small Screens Big Thinkers

Small Screens Big Thinkers

5th - 6th Grade

19 Qs

Threats To A Computer

Threats To A Computer

KG - University

20 Qs

IT Security & Encryption of Data

IT Security & Encryption of Data

8th - 10th Grade

15 Qs

Cybersecurity

Cybersecurity

7th Grade

20 Qs

SOCIAL ENGINEERING

SOCIAL ENGINEERING

8th Grade

16 Qs

Computer Crimes and Computer Ethics

Computer Crimes and Computer Ethics

6th - 10th Grade

21 Qs

GCSE J277 - 1.4.1 - Network Threats

GCSE J277 - 1.4.1 - Network Threats

7th Grade

20 Qs

Cyber crime and security

Cyber crime and security

Assessment

Quiz

Computers

6th - 8th Grade

Medium

Created by

M. Kalra

Used 42+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

_____________ are usually skilled computer programmers with knowledge of computer security.

Thieves

Robbers

Hackers

Bad Guys

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ransomware is a type of ________________.

tupperware

malware

parryware

good software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software Piracy includes:

Violation of copyrights

Sharing multiple copies of software

Selling or installing multiple copies of software onto personal or work computers.

All of these

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Spambot creates mailing lists and sends ________ mail.

junk

important

deleted

necessary

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____________ __________ occurs when a criminal gains access to your personal information to steal money or gain other benefits.

Identification problem

Identity lost

Identity theft

identification theft

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Raj is working on the Internet and finds something suspicious about the website. What should he do in such a situation??

Check the URL

Enter his details

Login and not worry

None of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The intention of ___________ hacker is to steal corporate data, violate privacy rights, transfer funds from bank accounts. Identify the type of Hacker.

Grey Hat

White Hat

Black Hat

Blue Hat

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?