Search Header Logo

Cyber Forensics Quiz 20

Authored by Prathik A

Computers

University

Used 4+ times

Cyber Forensics Quiz 20
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___________ refers to the action of forging a copy or imitation of a document, signature, or banknote.

Vulnerability

Forgery

DoS

Masquerader

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three general categories of computer systems that can contain digital evidence?

Desktop, laptop, server

Personal computer, Internet, mobile telephone

Hardware, software, networks

Open computer systems, communication systems, embedded systems

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is a piece of code, usually written in JavaScript, that infects your computer silently via web browser to mine cryptocurrencies

Hacking

CryptoJacking

Ransomware Distribution

Pharming

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. This is called as

Cyber warfare

Cyberspace

Cyber squatting

Cyber extortion

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A _________ attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.

Dictionary

Man-in-the-middle

DDoS

Meet-in-the-middle

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___________ is a software designed to duplicate itself, and this is done by replicating itself into various programs that are stored in the computer.

Replay

Virus

Phishing

Side channel attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking is an example of:

Computer-assisted crime

Computer-related crime

Computer-integrity crime

Computer malfeasance crime

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?