CYBERCRIME

CYBERCRIME

University

12 Qs

quiz-placeholder

Similar activities

Computer Software

Computer Software

KG - Professional Development

15 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

CNET151 - Chapt 12 - Cyber Terrorism & Information Warfare

CNET151 - Chapt 12 - Cyber Terrorism & Information Warfare

University

15 Qs

Malware And Hackers

Malware And Hackers

KG - University

14 Qs

Computer Coding

Computer Coding

KG - Professional Development

12 Qs

IAS Quiz 1

IAS Quiz 1

University

16 Qs

Quiz about cybersecurity

Quiz about cybersecurity

University

7 Qs

CSE_Chap1

CSE_Chap1

University

10 Qs

CYBERCRIME

CYBERCRIME

Assessment

Quiz

Computers

University

Hard

Created by

Umamaheswari R

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one option is not a type of cybercrime?

Data theft

Forgery

Installing Antivirus

Data and system damage

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cyber-crime can be categorized into ________ types.

2

3

4

6

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The first computer virus is --------

ILOVEYOU
Mydoom
Creeper
Code Red

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not done by cybercriminals?

Stealing personal information
Spreading malware
Hacking into systems
Promoting online safety

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

McAfee is an example of

Photo Editing Software

Quick Heal

Virus

Antivirus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a computer virus work?

A computer virus works by attaching itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels
A computer virus works by physically damaging the computer hardware
A computer virus works by making the computer run faster
A computer virus works by improving the computer's performance

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are types of password attack ?


Electronic Attack


Non electronic attack

Man in middle attack

Shoulder surfing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?