You are on page 1of 2

CRIME LISTENING EXERCISE

Watch the video and complete the exercise below.


James Lyne: Everyday cybercrime -- and what you can do about it - YouTube

1) Put the last sentence you heard in the correct order

Put the words in order: and that like. someone specializes looks This in malware is what hacking
This is what someone that specializes in malware and hacking looks like

2) Replay this part and add the missing words

Fill the gap: Some malicious code today goes as far as targeting power,
utilities and infrastructure.

3) Most viruses are caught in porn websites. Is it true?

Answer the question using your own words: It is not true since they are captured on company websites

4) Listen again and fill in the missing words

Fill the gap: … this testing platform, which Enable the cybercriminals to test the quality
of their viruses before they release them on the world.

5) Listen again and fill in the gaps

Fill the gap: It comes with technical installation guides, video setup
routines, and get this, technical support.

6) How do you get infected through a USB key?

Answer the question using your own words Connectingthe USB memory and executimg a program code with
which you have access to the entire computer

7) What do you think will happen?

Answer the question using your own words An application could appear that will be on it´s own

8) Which cloud service websites do you know or use?

Answer the question using your own words The one used in the video is that of antivirus, but there may also be
product promotions

9) An interesting feature of modern smartphone is that when it takes a picture..

Put the words in order: photo … about it data where GPS was embeds that taken.
It embeds GPS data about where that photo…was taken

10) What details did James Lynes mention to track information?

a. home address, email and mobile number

b. telephone number, picture ID and email

c. email, phone and GPS information

11) Complete with the missing word

Find the extra word and highlight it: It turns out he's a member of the Russian Adult Webmasters Federation.
12) Listen again and reorder the scrambled words

Put the words in order: colleagues families even our break security the friends, when Our we our our things.

can do and right


Our friends, our families and our colleagues can break our segurity even when we do the right things

13) How would you explain the meaning of the verb "to beam out"?

Answer the question using your own words Throwing, ejecting, or throwing something out

14) Which is the incorrect word?

Correct the wrong word: Your wireless network name is so unique that I was able to pingpong it using data available
openly on the Internet with no hacking …

15) Listen again and put the scrambled words in the correct order

Put the words in order: trading and how … much security? are privacy we for off convenience

How much are we trading of convenience for privacy and security?

16) Fill the gap: … despite cybercrime conventions, where the Internet is borderless and
international by definition.

17) Put the scrambled words in the correct order

Put the words in order: security me much, make Help more and cybercriminals. the for difficult community much life
Help me and the security community make life much, much more difficult for cybercriminals.

You might also like