Understanding Cyber Crimes

Understanding Cyber Crimes

University

23 Qs

quiz-placeholder

Similar activities

STS GENAP INFORMATIKA 9

STS GENAP INFORMATIKA 9

9th Grade - University

28 Qs

PTS Genap Informatika Kelas XII

PTS Genap Informatika Kelas XII

12th Grade - University

20 Qs

Introduction to Ethical Hacking

Introduction to Ethical Hacking

University

20 Qs

Information Security Quiz

Information Security Quiz

University

20 Qs

IT for Managers M1

IT for Managers M1

University

20 Qs

Quiz 2: Digital Intellectual Property

Quiz 2: Digital Intellectual Property

University

20 Qs

Quiz: Ethics in Computing

Quiz: Ethics in Computing

University

19 Qs

Understanding ICT in Business

Understanding ICT in Business

University

20 Qs

Understanding Cyber Crimes

Understanding Cyber Crimes

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

gb thapa

Used 2+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is cyber crime?

Cyber crime only involves hacking into personal emails.

Cyber crime is exclusively related to online gaming.

Cyber crime is a type of physical theft.

Cyber crime is criminal activity that involves computers and networks.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Name one common type of cyber crime.

Phishing

Identity theft

Hacking

Malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

Phishing refers to a legitimate marketing strategy for online businesses.

Phishing is a type of cyber attack that seeks to obtain sensitive information by deceiving users.

Phishing is a type of software used for data encryption.

Phishing is a method of securing data from unauthorized access.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does ransomware work?

Ransomware deletes files permanently without any warning.

Ransomware only affects mobile devices and not computers.

Ransomware encrypts files on a victim's computer and demands a ransom for decryption.

Ransomware provides free decryption tools after a certain period.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is identity theft in the context of cyber crime?

Collecting personal data for market research purposes.

Identity theft is the unauthorized use of someone else's personal information for fraudulent purposes.

Sharing personal information with friends and family.

Using personal information to create a new identity legally.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the potential consequences of cyber crimes?

Cyberattacks cause financial, data, reputational, service, legal, and trust damage.

Increased internet speed

Improved customer service

Enhanced data security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of a firewall in preventing cyber crimes?

A firewall improves internet speed by optimizing traffic.

A firewall encrypts data to prevent unauthorized access.

A firewall acts as a backup for lost data.

A firewall secures networks by controlling traffic, blocking unauthorized access and malicious activity.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?