Search Header Logo

Cyber Crimes vocab

Authored by Emily Murphy

Science

11th - 12th Grade

Used 53+ times

Cyber Crimes vocab
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A copy made in the same type of medium.

phishing

malware

clone

worm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The specialized practice of identifying, preserving, extracting, documenting, and interpreting electronic data that can be used as evidence.

internet forensics

computer forensics

content spyware

cyber-terrorism

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software that is used to allow a hacker to access all of the activity on an individual's personal or business computer.

content spyware

Trojan horse

malware

hacking

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

hacking into a company's internal networking system for the purpose of demonstrating or presenting a political agenda.

hacking

phishing

malware

cyber-terrorism

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Intentionally entering an unauthorized network system.

phishing

hacking

malware

worm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

uses the same analysis techniques as a computer forensics except the emphasis is placed on the internet as a whole.

Internet forensics

computer forensics

content spyware

cyber-terrorism

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

software designed to provide unauthorized access to a computer system.

phishing

Trojan horse

worm

malware

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?