Cybercrime and Computer Laws Review Exam

Cybercrime and Computer Laws Review Exam

University

81 Qs

quiz-placeholder

Similar activities

United States Geography Quiz

United States Geography Quiz

3rd Grade - Professional Development

86 Qs

Prueba de Conocimientos I

Prueba de Conocimientos I

University

80 Qs

World War I Unit Assessment

World War I Unit Assessment

KG - University

81 Qs

Road to .....And  American Revolution

Road to .....And American Revolution

6th Grade - University

86 Qs

PERKEMBANGAN KOGNITIF ANAK USIA DINI

PERKEMBANGAN KOGNITIF ANAK USIA DINI

University

79 Qs

Einführung in die Empirische Sozialforschung und Statistik

Einführung in die Empirische Sozialforschung und Statistik

University

86 Qs

Declaration of Independence & Articles of Confederation (Part 1)

Declaration of Independence & Articles of Confederation (Part 1)

12th Grade - University

83 Qs

Cybercrime and Computer Laws Review Exam

Cybercrime and Computer Laws Review Exam

Assessment

Quiz

Social Studies

University

Practice Problem

Medium

Created by

El Señor

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

81 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the use of a computer as an instrument to further illegal ends?

Cybercrime

Transnational Crime

Computer Crime

A and C are correct

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This refers to the intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.

Illegal Access

Illegal Interception

Data Interference

System Interference

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible.

Computer-related Forgery

Computer-related fraud

Computer related Identity theft

Cyber Libel

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This refers to the unauthorized access into or interference in a computer system/server, or information and communication system, or any access in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices without the knowledge and consent of the owner of the computer or information and communication system, including the introduction of computer viruses and the like resulting in the corruption, destruction, alteration, theft, or loss of electronic data messages or electronic documents.

Child Pornography

Photo or Video Voyeurism

Hacking

Access Device

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the type of malware that tricks the computer user into thinking that it is legitimate software, but actually contains hidden functions.

Backdoor

Trojan Horse

Virus

Computer Worm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the type of malware that is used to get unauthorized access to a website by the cybercriminals?

Backdoor

Trojan Horse

Virus

Computer Worm

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the type of scam in which the criminals attempt to obtain someone's personal information by pretending to be a legitimate business, a neighbor, or someone other innocent party?

Spoofing

Pharming

Redirectors

Floating windows

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?