Cyber Police: Series 1 - Suggested Quiz Questions

mceclip1.png

Cyber Police: Series 1 Suggested Quiz Questions


Episode 1 Quiz

1. Organised criminals prefer cyber crime over traditional forms of crime as:

a. It requires a higher level of skill.
b. It is high payoff with a relatively low risk. (correct)
c. It is harder to detect.


2. For charities and other types of organisations, the reputational damage from a data breach can cause as much harm as the breach itself.

a. True (correct)
b. False


3. When trying to trick users into revealing their login credentials for social media platforms, cybercriminals will use: (Choose all that apply)

a. Threatening emails. (correct)
b. Fake campaigns.
c. Fake login sites that look the same as genuine sites. (correct)
d. Direct messages on the social media platforms. (correct)


Episode 2 Quiz

1. Cyber crime is comprised entirely of online scams.

a. True
b. False (correct)


2. Even when using the Cloud exclusively to store data, valuable information can be retrieved from stolen laptops.

a. True (correct)
b. False


3. Hybrid working has made it easier to identify strangers in the work environment.

a. True
b. False (correct)


Episode 3 Quiz

1. You can always trust the contents of an email if it comes from a legitimate address at a trusted organisation.

a. True
b. False (correct)


2. It is a good idea to only make minor changes to your password when you need to change it, as it is easier to remember.

a. True
b. False (correct)


3. Cybercriminals will often commit several small scams before moving on to their main target.

a. True (correct)
b. False


Episode 4 Quiz

1. Fake profiles on online shopping sites are easily spotted, as criminals won’t spend time making them look genuine.

a. True
b. False (correct)


2. Criminals will target you when you are busy, as you are more likely to be distracted.

a. True (correct)
b. False


3. When logging in to PayPal from a link, you can be certain the site is genuine if you are prompted to enter a Multi-Factor Authentication code.

a. True
b. False (correct)


Episode 5 Quiz

1. Information Security only applies to digitally stored data.

a. True
b. False (correct)


2. It is safe to dispose of sensitive information in a regular rubbish bin if it is more than five years old.

a. True
b. False (correct)


3. Before disposing of printed documents, they should be assessed to determine if they contain sensitive data.

a. True (correct)
b. False


Episode 6 Quiz

1. Which of the following are features of Ransomware? (Choose all that apply.)

a. When your files are locked on your device and cannot be accessed without paying a
ransom. (correct)
b. When your computer is locked and cannot be accessed without paying a ransom.
(correct)
c. When you receive a link in a phishing email.
d. When you are threatened with the release of stolen files unless you pay a ransom.
(correct)


2. If you receive a request from a trusted source that bypasses normal procedure, you should comply with it.

a. True
b. False (correct)


3. A highly tailored email scam is known as:

a. Phishing
b. Spear Phishing (correct)
c. Smishing
d. Vishing


Episode 7 Quiz

1. If you see someone in an area they should not have access to, you should: (Choose any that apply.)

a. Ignore it
b. Challenge them (correct)
c. Report it (correct)


2. If you find a suspicious device connected to your computer, you should:

a. Remove it
b. Report it (correct)
c. Ignore it


3. Hardware exists that can be connected to your computer to capture your keystrokes.

a. True (correct)
b. False

Back to all articles