Well done for playing week 3 of the Spring Cyber Challenge, brought to you by NCA Cyber Choices.

How did you do? Check your answers here.

Remember, lucky prize winners will be contacted by email, so keep an eye on your inbox! Now, time to take on week 4…

1. What is waterholing?

Answer: A. Where a hacker inserts poisoned links in a trusted website.

Waterhole because that’s where everyone congregates for good things.

2. What is the generic name for malware that frightens you into taking bogus security software?

Answer: B. Scareware

3. Which of these, described by Robert Ben Caldini as key influencing concepts, are used by anti-social engineers?

Answer: D. All of the above

Social proof – people tend to do things they see other people doing

Reciprocity – people believe one good turn deserves another

Authority – people tend to obey authority figures even if they don’t agree with the instruction

4. What criminal targeting do you risk by telling  everyone on social media about your flight details?

Answer: D. All of the above

It’s a dangerous business telling people where you are off on holiday! Virtual kidnapping, physical burglary of your home whilst you are away, impersonation of one of your family to their colleagues with instructions to follow whilst you are all travelling  Stay safe and show them the photos when you get back!

5. A television show judge on which show was tricked in 2020 in a social engineering scam where the criminal impersonated their assistant’s email?

Answer: A. Shark Tank

Barbara Corcoran lost nearly $400,000 in this scam.

6. According to the resource for 12 to 17 year olds found on, what is a possible consequence of breaking the Computer Misuse Act 1990?

Answer: D. All of the above

Just not worth it!  Having devices seized, getting a criminal record and being unable to travel to certain countries.

7. In the film ‘Teenage Cybercrime’ hosted on, the subject’s dad jokes about his son robbing where?

Answer: B. The bank

8. According to the resource for 12 to 17 year olds found on, what is the Computer Misuse Act 1990 offence where someone commits unauthorised acts creating, or causing risk of, serious damage?

Answer: C. A Section 3ZA offence