Cyber Forensics Quiz 20

Cyber Forensics Quiz 20

University

12 Qs

quiz-placeholder

Similar activities

Network Advantages and Disadvantages

Network Advantages and Disadvantages

10th Grade - University

15 Qs

Chapter 1 quizzes

Chapter 1 quizzes

University

13 Qs

Ethical Hacking

Ethical Hacking

University

15 Qs

Computing Y7 Lesson4 Quiz

Computing Y7 Lesson4 Quiz

12th Grade - University

10 Qs

ROUND 2

ROUND 2

University

17 Qs

PRE TEST PERTEMUAN 10 KOMPUTER DAN MASYARAKAT - CYBER CRIME

PRE TEST PERTEMUAN 10 KOMPUTER DAN MASYARAKAT - CYBER CRIME

University

10 Qs

How Safe are you? (Disclaimer: I do not own these questions)

How Safe are you? (Disclaimer: I do not own these questions)

University

10 Qs

Hacking Scenarios

Hacking Scenarios

University

12 Qs

Cyber Forensics Quiz 20

Cyber Forensics Quiz 20

Assessment

Quiz

Computers

University

Medium

Created by

Prathik A

Used 4+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___________ refers to the action of forging a copy or imitation of a document, signature, or banknote.

Vulnerability

Forgery

DoS

Masquerader

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three general categories of computer systems that can contain digital evidence?

Desktop, laptop, server

Personal computer, Internet, mobile telephone

Hardware, software, networks

Open computer systems, communication systems, embedded systems

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is a piece of code, usually written in JavaScript, that infects your computer silently via web browser to mine cryptocurrencies

Hacking

CryptoJacking

Ransomware Distribution

Pharming

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. This is called as

Cyber warfare

Cyberspace

Cyber squatting

Cyber extortion

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A _________ attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.

Dictionary

Man-in-the-middle

DDoS

Meet-in-the-middle

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___________ is a software designed to duplicate itself, and this is done by replicating itself into various programs that are stored in the computer.

Replay

Virus

Phishing

Side channel attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking is an example of:

Computer-assisted crime

Computer-related crime

Computer-integrity crime

Computer malfeasance crime

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?