
Lesson 6: Criminal Use
Authored by Ronnie Adom
Information Technology (IT)
9th - 12th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the Computer Misuse Act criminalise?
A) Social media use
B) Unauthorised access
C) Legal software updates
D) Data encryption
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can companies prevent social engineering?
A) Weak passwords
B) Security training
C) Ignoring emails
D) Disabling firewalls
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is social engineering effective?
A) Exploits human psychology
B) Requires programming skills
C) Needs software updates
D) Blocks malware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does baiting involve?
A) Deleting malware
B) Using fake offers to lure users
C) Increasing security
D) Backing up files
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is tailgating?
A) Entering a secure area without permission
B) Encrypting data
C) Phishing emails
D) Strong passwords
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is phishing?
A) Secure email use
B) Fake emails tricking users
C) Encrypting messages
D) Changing passwords
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does least privilege access mean?
A) Admin rights for all
B) Restricted access
C) Open networks
D) Free file sharing
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?