
Cybercrime and Computer Laws Review Exam
Quiz
•
Social Studies
•
University
•
Medium
El Señor
Used 2+ times
FREE Resource
81 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the use of a computer as an instrument to further illegal ends?
Cybercrime
Transnational Crime
Computer Crime
A and C are correct
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This refers to the intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.
Illegal Access
Illegal Interception
Data Interference
System Interference
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible.
Computer-related Forgery
Computer-related fraud
Computer related Identity theft
Cyber Libel
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This refers to the unauthorized access into or interference in a computer system/server, or information and communication system, or any access in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices without the knowledge and consent of the owner of the computer or information and communication system, including the introduction of computer viruses and the like resulting in the corruption, destruction, alteration, theft, or loss of electronic data messages or electronic documents.
Child Pornography
Photo or Video Voyeurism
Hacking
Access Device
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the type of malware that tricks the computer user into thinking that it is legitimate software, but actually contains hidden functions.
Backdoor
Trojan Horse
Virus
Computer Worm
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the type of malware that is used to get unauthorized access to a website by the cybercriminals?
Backdoor
Trojan Horse
Virus
Computer Worm
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the type of scam in which the criminals attempt to obtain someone's personal information by pretending to be a legitimate business, a neighbor, or someone other innocent party?
Spoofing
Pharming
Redirectors
Floating windows
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
76 questions
SOAL UAS HUKUM C
Quiz
•
University
80 questions
Harga Transfer
Quiz
•
University
81 questions
ENVI Policy (Midterm)
Quiz
•
University
85 questions
TRY OUT 1 PPPK
Quiz
•
University - Professi...
80 questions
NEP 2-review
Quiz
•
1st Grade - University
85 questions
Quality Service Management
Quiz
•
University
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade