1 Understanding Cybercrime and Cybersecurity

1 Understanding Cybercrime and Cybersecurity

University

24 Qs

quiz-placeholder

Similar activities

Chapter 13 Initial Coin Offering (ICO)

Chapter 13 Initial Coin Offering (ICO)

University

20 Qs

1st Quizziz

1st Quizziz

University

22 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

20 Qs

IAS_F_Quiz 1

IAS_F_Quiz 1

University

20 Qs

Cyber Hygiene

Cyber Hygiene

University

20 Qs

Seminar 18+

Seminar 18+

University

20 Qs

Cyber Security  Quiz

Cyber Security Quiz

University

20 Qs

Cyber Security

Cyber Security

1st Grade - Professional Development

25 Qs

1 Understanding Cybercrime and Cybersecurity

1 Understanding Cybercrime and Cybersecurity

Assessment

Quiz

Other

University

Easy

Created by

Rabiul Hasan

Used 3+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is cybercrime?

A physical crime involving computers

Illegal activities carried out using digital technology

Crimes committed without any technology

A type of programming language

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT a cybercrime?

Phishing

Bank robbery

Identity theft

Ransomware attack

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which term refers to the use of the internet to carry out politically motivated attacks?

Cyber hacking

Cyber espionage

Cyber terrorism

Cyber fraud

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which type of cybercriminal is often driven by social or political activism?

State-sponsored actors

Hacktivists

Insider threats

Cyber terrorists

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary goal of state-sponsored cyber threat actors?

To entertain themselves

To disrupt or gain intelligence on another nation

To commit financial fraud

To improve cybersecurity defenses

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of an insider threat?

An external hacker breaching a company's network

A rogue employee leaking sensitive company data

A phishing attack through email

A brute-force attack on a password

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a cybercrime technique where attackers deceive users into providing sensitive information?

Phishing

DDoS attack

Ransomware

Malware injection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?