Podcast
Questions and Answers
True or false: Cybercrime only affects individuals financially and personally?
True or false: Cybercrime only affects individuals financially and personally?
False (B)
True or false: Cybercriminals exploit vulnerabilities in hardware and software to commit cybercrimes?
True or false: Cybercriminals exploit vulnerabilities in hardware and software to commit cybercrimes?
True (A)
True or false: A computer virus is an executable program that harms a user and their computer?
True or false: A computer virus is an executable program that harms a user and their computer?
True (A)
True or false: A virus can spread itself to other computers?
True or false: A virus can spread itself to other computers?
True or false: A phishing scam is when you receive a trustworthy email asking you to login to your account?
True or false: A phishing scam is when you receive a trustworthy email asking you to login to your account?
True or false: Cybercriminals are becoming less skilled each year?
True or false: Cybercriminals are becoming less skilled each year?
Which of the following is a method that cybercriminals use to infect someone's computer?
Which of the following is a method that cybercriminals use to infect someone's computer?
What is a phishing scam?
What is a phishing scam?
What is the main cause of system hacking according to the video?
What is the main cause of system hacking according to the video?
Why do cybercriminals send spam emails?
Why do cybercriminals send spam emails?
A ______ scam is when you get what seems like a trustworthy email asking you to login to your account, but clicking the email takes you to a fake website.
A ______ scam is when you get what seems like a trustworthy email asking you to login to your account, but clicking the email takes you to a fake website.
Once a virus is on your computer it can steal or delete any of your files, control other ______, or even allow someone else to remotely control your computer.
Once a virus is on your computer it can steal or delete any of your files, control other ______, or even allow someone else to remotely control your computer.
What is a phishing scam and how does it work?
What is a phishing scam and how does it work?
Why are human mistakes often the cause of system hacking?
Why are human mistakes often the cause of system hacking?
What steps can individuals take to protect themselves from cybercrime?
What steps can individuals take to protect themselves from cybercrime?