WEEK 4-5 SP101

WEEK 4-5 SP101

University

25 Qs

quiz-placeholder

Similar activities

Cyber Security Quiz1

Cyber Security Quiz1

University

20 Qs

PPL 223 ( QUIZ 2) Syntax and Semantics

PPL 223 ( QUIZ 2) Syntax and Semantics

University

20 Qs

Technology Tools

Technology Tools

University

20 Qs

quiziz 4 sumber media 2sda5

quiziz 4 sumber media 2sda5

University

20 Qs

Penjaminan Kualitas Sistem Informasi

Penjaminan Kualitas Sistem Informasi

University

20 Qs

Data Science Quiz1

Data Science Quiz1

University

20 Qs

TD5-RA&RV

TD5-RA&RV

University

20 Qs

DATA STRUCTUIR Quiz1 (AIML)

DATA STRUCTUIR Quiz1 (AIML)

University

20 Qs

WEEK 4-5 SP101

WEEK 4-5 SP101

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Joel Almazan

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

1. What is the primary goal of computer crime?




A. To improve software efficiency

B. To promote online education

C. To conduct illegal activities using computers or networks

D. To increase system performance

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

2. Which of the following is an example of phishing?




A. Infecting a computer with malware

B. Sending deceptive emails to obtain personal information

C. Physically stealing a laptop

D. Encrypting files for data protection

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

3. A Denial of Service (DoS) attack aims to:



A. Provide unlimited internet access

B. Overload systems to make them unavailable

D. Restore backup data

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

4. What type of cybercrime involves stealing someone’s personal data to commit fraud?



A. Cyber terrorism

B. Cyber espionage

C. Identity theft

D. Intellectual property theft

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

5. Cyber fraud involves:



A. Ethical hacking activities

B. Illegal access to government records

C. Manipulating systems to gain money or property

D. Disabling anti-virus software

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

6. The illegal act of intercepting data from individuals or companies is called:



A. Cyber terrorism

B. Cyber fraud

C. Cyber espionage

D. Script kiddie attack

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

7. Which of the following is considered cyber terrorism?


A. Using encryption to secure messages

B. Spreading malware for fun

C. Hacking government databases to cause panic

D. Testing software vulnerabilities with permission

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)