1 Understanding Cybercrime and Cybersecurity

1 Understanding Cybercrime and Cybersecurity

University

24 Qs

quiz-placeholder

Similar activities

3D151 CDC Vol 1 Unit 2

3D151 CDC Vol 1 Unit 2

University - Professional Development

29 Qs

Data Analytics and Artificial Intelligence Quiz

Data Analytics and Artificial Intelligence Quiz

University

20 Qs

Pretest Acara 1 Peny. melalui Media Internet

Pretest Acara 1 Peny. melalui Media Internet

University

20 Qs

CYBER CHALLENGES'24 QUIZ BATCH 3

CYBER CHALLENGES'24 QUIZ BATCH 3

University

20 Qs

Introduction to Business Review #1

Introduction to Business Review #1

11th Grade - University

20 Qs

IT Requirements and Solutions Quiz

IT Requirements and Solutions Quiz

University

28 Qs

Management Functions Test

Management Functions Test

11th Grade - University

20 Qs

CySec FD - 5A PNM 2022

CySec FD - 5A PNM 2022

University

25 Qs

1 Understanding Cybercrime and Cybersecurity

1 Understanding Cybercrime and Cybersecurity

Assessment

Quiz

Other

University

Easy

Created by

Rabiul Hasan

Used 3+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is cybercrime?

A physical crime involving computers

Illegal activities carried out using digital technology

Crimes committed without any technology

A type of programming language

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT a cybercrime?

Phishing

Bank robbery

Identity theft

Ransomware attack

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which term refers to the use of the internet to carry out politically motivated attacks?

Cyber hacking

Cyber espionage

Cyber terrorism

Cyber fraud

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which type of cybercriminal is often driven by social or political activism?

State-sponsored actors

Hacktivists

Insider threats

Cyber terrorists

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary goal of state-sponsored cyber threat actors?

To entertain themselves

To disrupt or gain intelligence on another nation

To commit financial fraud

To improve cybersecurity defenses

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of an insider threat?

An external hacker breaching a company's network

A rogue employee leaking sensitive company data

A phishing attack through email

A brute-force attack on a password

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a cybercrime technique where attackers deceive users into providing sensitive information?

Phishing

DDoS attack

Ransomware

Malware injection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?