
Cybercrime and Computer Laws Review Exam

Quiz
•
Social Studies
•
University
•
Medium
El Señor
Used 2+ times
FREE Resource
81 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the use of a computer as an instrument to further illegal ends?
Cybercrime
Transnational Crime
Computer Crime
A and C are correct
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This refers to the intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.
Illegal Access
Illegal Interception
Data Interference
System Interference
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible.
Computer-related Forgery
Computer-related fraud
Computer related Identity theft
Cyber Libel
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This refers to the unauthorized access into or interference in a computer system/server, or information and communication system, or any access in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices without the knowledge and consent of the owner of the computer or information and communication system, including the introduction of computer viruses and the like resulting in the corruption, destruction, alteration, theft, or loss of electronic data messages or electronic documents.
Child Pornography
Photo or Video Voyeurism
Hacking
Access Device
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the type of malware that tricks the computer user into thinking that it is legitimate software, but actually contains hidden functions.
Backdoor
Trojan Horse
Virus
Computer Worm
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the type of malware that is used to get unauthorized access to a website by the cybercriminals?
Backdoor
Trojan Horse
Virus
Computer Worm
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the type of scam in which the criminals attempt to obtain someone's personal information by pretending to be a legitimate business, a neighbor, or someone other innocent party?
Spoofing
Pharming
Redirectors
Floating windows
Create a free account and access millions of resources
Similar Resources on Wayground
86 questions
United States Geography Quiz

Quiz
•
3rd Grade - Professio...
80 questions
Cost Accounting Quiz

Quiz
•
University
85 questions
TRY OUT 1 PPPK

Quiz
•
University - Professi...
79 questions
Project Management - HIMOLDE

Quiz
•
University
77 questions
AP Microeconomics Unit 3 Review

Quiz
•
10th Grade - University
80 questions
Harga Transfer

Quiz
•
University
81 questions
ENVI Policy (Midterm)

Quiz
•
University
77 questions
Tài liệu HRM cuối kì UEF Chap3

Quiz
•
University
Popular Resources on Wayground
55 questions
CHS Student Handbook 25-26

Quiz
•
9th Grade
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
10 questions
Chaffey

Quiz
•
9th - 12th Grade
15 questions
PRIDE

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
22 questions
6-8 Digital Citizenship Review

Quiz
•
6th - 8th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade