Understanding Cyber Crimes

Understanding Cyber Crimes

University

23 Qs

quiz-placeholder

Similar activities

Digital Ethics and AI Awareness

Digital Ethics and AI Awareness

7th Grade - University

20 Qs

Information Technology Quiz

Information Technology Quiz

University

20 Qs

Cyber Security Quiz1

Cyber Security Quiz1

University

20 Qs

Cybersecurity Knowlege assessment

Cybersecurity Knowlege assessment

University

24 Qs

Jenis dan Dampak Malware Informatika Kelas 9

Jenis dan Dampak Malware Informatika Kelas 9

9th Grade - University

20 Qs

Cybercrime exercise

Cybercrime exercise

7th Grade - University

23 Qs

Q5. Ethical Issues in information technology

Q5. Ethical Issues in information technology

University

20 Qs

Danger online

Danger online

7th Grade - University

25 Qs

Understanding Cyber Crimes

Understanding Cyber Crimes

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

gb thapa

Used 2+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is cyber crime?

Cyber crime only involves hacking into personal emails.

Cyber crime is exclusively related to online gaming.

Cyber crime is a type of physical theft.

Cyber crime is criminal activity that involves computers and networks.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Name one common type of cyber crime.

Phishing

Identity theft

Hacking

Malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

Phishing refers to a legitimate marketing strategy for online businesses.

Phishing is a type of cyber attack that seeks to obtain sensitive information by deceiving users.

Phishing is a type of software used for data encryption.

Phishing is a method of securing data from unauthorized access.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does ransomware work?

Ransomware deletes files permanently without any warning.

Ransomware only affects mobile devices and not computers.

Ransomware encrypts files on a victim's computer and demands a ransom for decryption.

Ransomware provides free decryption tools after a certain period.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is identity theft in the context of cyber crime?

Collecting personal data for market research purposes.

Identity theft is the unauthorized use of someone else's personal information for fraudulent purposes.

Sharing personal information with friends and family.

Using personal information to create a new identity legally.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the potential consequences of cyber crimes?

Cyberattacks cause financial, data, reputational, service, legal, and trust damage.

Increased internet speed

Improved customer service

Enhanced data security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of a firewall in preventing cyber crimes?

A firewall improves internet speed by optimizing traffic.

A firewall encrypts data to prevent unauthorized access.

A firewall acts as a backup for lost data.

A firewall secures networks by controlling traffic, blocking unauthorized access and malicious activity.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)