Cybercrime and Computer Laws Review Exam

Cybercrime and Computer Laws Review Exam

University

81 Qs

quiz-placeholder

Similar activities

Project Management - HIMOLDE

Project Management - HIMOLDE

University

79 Qs

Global II Midterm Review 2025

Global II Midterm Review 2025

10th Grade - University

77 Qs

Unit 3 - U.S. Constitution Review

Unit 3 - U.S. Constitution Review

10th Grade - University

77 Qs

European Union

European Union

KG - Professional Development

77 Qs

Early Medieval Europe

Early Medieval Europe

7th Grade - University

80 Qs

Holocaust

Holocaust

9th Grade - University

86 Qs

Absolutism

Absolutism

9th Grade - University

78 Qs

Science, Technology and National Development

Science, Technology and National Development

University

81 Qs

Cybercrime and Computer Laws Review Exam

Cybercrime and Computer Laws Review Exam

Assessment

Quiz

Social Studies

University

Medium

Created by

El Señor

Used 2+ times

FREE Resource

81 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the use of a computer as an instrument to further illegal ends?

Cybercrime

Transnational Crime

Computer Crime

A and C are correct

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This refers to the intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.

Illegal Access

Illegal Interception

Data Interference

System Interference

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible.

Computer-related Forgery

Computer-related fraud

Computer related Identity theft

Cyber Libel

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This refers to the unauthorized access into or interference in a computer system/server, or information and communication system, or any access in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices without the knowledge and consent of the owner of the computer or information and communication system, including the introduction of computer viruses and the like resulting in the corruption, destruction, alteration, theft, or loss of electronic data messages or electronic documents.

Child Pornography

Photo or Video Voyeurism

Hacking

Access Device

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the type of malware that tricks the computer user into thinking that it is legitimate software, but actually contains hidden functions.

Backdoor

Trojan Horse

Virus

Computer Worm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the type of malware that is used to get unauthorized access to a website by the cybercriminals?

Backdoor

Trojan Horse

Virus

Computer Worm

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the type of scam in which the criminals attempt to obtain someone's personal information by pretending to be a legitimate business, a neighbor, or someone other innocent party?

Spoofing

Pharming

Redirectors

Floating windows

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Social Studies