0% found this document useful (0 votes)
68 views4 pages

Cybercrime and Malware Exercises

The document consists of exercises related to cybercrime and malware, including multiple-choice questions, true or false statements, short answer questions, and scenario-based questions. It covers topics such as definitions of cybercrime, types of malware, and best practices for online safety. The exercises aim to educate individuals about the risks associated with cyber activities and how to respond to potential threats.

Uploaded by

SpiritNable Lana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views4 pages

Cybercrime and Malware Exercises

The document consists of exercises related to cybercrime and malware, including multiple-choice questions, true or false statements, short answer questions, and scenario-based questions. It covers topics such as definitions of cybercrime, types of malware, and best practices for online safety. The exercises aim to educate individuals about the risks associated with cyber activities and how to respond to potential threats.

Uploaded by

SpiritNable Lana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Cybercrime and Malware Exercises

Section A: Multiple-Choice Questions


1. What is cybercrime?
A) A crime that happens in real life
B) A crime that happens online using computers or the internet
C) A crime only related to video games
D) A crime that has no punishment

2. Which of the following is NOT a type of cybercrime?


A) Hacking
B) Phishing
C) Playing online games
D) Identity theft

3. What is phishing?
A) A type of cybercrime where criminals send fake emails to steal information
B) A type of virus that infects computers
C) A hacking technique to break into computers
D) A safe way to protect your data

4. What type of malware locks your files and asks for money to unlock them?
A) Trojan
B) Ransomware
C) Spyware
D) Adware

5. Which of these is an example of identity theft?


A) Creating a strong password
B) Someone using your personal details to open a bank account
C) Buying items from an online store
D) Updating your software
Section B: True or False
1. A virus is a type of malware that can spread from one computer to another.
(True / False)
6. Phishing emails often come from trusted sources like banks and schools. (True /
False)
7. If you receive an email saying you won a lottery you never entered, it is most
likely a scam. (True / False)
8. Adware helps protect your computer from hackers. (True / False)
9. Spyware can secretly record what you type, including your passwords. (True /
False)

Section D: Short Answer Questions

1. What is the difference between hacking and phishing?


_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

2. Why should you avoid downloading files from unknown websites?


_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________
3. What should you do if you receive an email asking for your password?
_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

4. Name one type of cybercrime that can happen on social media.


_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

Section E: Scenario-Based Questions


1. Your friend receives a message saying, 'Congratulations! You won an iPhone!
Click this link to claim your prize.' What should your friend do?
_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

2. Ali downloads a free game from an unknown website. Later, his computer
becomes slow, and strange ads pop up. What might have happened?
_____________________________________________________________________________________________

_____________________________________________________________________________________________
_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

3. Siti's Instagram account gets hacked, and the hacker starts messaging her friends
asking for money. What should Siti do next?
_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

4. You open an email from your bank asking you to enter your password to avoid
account suspension. How can you check if the email is real or fake?
_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

5. Your classmate installs a program secretly recording everything typed on the


school computer. What type of malware is this?
_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

_____________________________________________________________________________________________

You might also like