Quiz Adversarial Behaviour

Quiz Adversarial Behaviour

University

30 Qs

quiz-placeholder

Similar activities

Pemahaman Jaringan Komputer

Pemahaman Jaringan Komputer

8th Grade - University

25 Qs

Quiz Merancang Pseudocode

Quiz Merancang Pseudocode

10th Grade - University

25 Qs

SAS Dasar Program Keahlian RPL Kelas X

SAS Dasar Program Keahlian RPL Kelas X

10th Grade - University

25 Qs

ITE 292 Long Quiz

ITE 292 Long Quiz

University

26 Qs

Database Technologies Quiz

Database Technologies Quiz

University

25 Qs

ICT Term 3 Quiz

ICT Term 3 Quiz

7th Grade - University

25 Qs

WEB SYSTEM AND TECHNOLOGY MIDTERM REVIEWER

WEB SYSTEM AND TECHNOLOGY MIDTERM REVIEWER

University

28 Qs

Quiz Adversarial Behaviour

Quiz Adversarial Behaviour

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Medium

Created by

Yudhistira Nugraha

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best characterizes the motivation of hacktivists as adversaries?

Economic profit through cryptocurrency mining

Political or ideological goals through cyber disruption

Coordinated fraud to gain financial advantage

Gathering of private data for blackmailing

Exploiting vulnerabilities for ransomware deployment

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In environmental criminology, a crime generator is defined as:

A location that attracts offenders due to poor surveillance

A place where opportunities for crime are created by normal activities

A tool used by cybercriminals to automate attacks

A software exploit used to generate phishing campaigns

A network hub used for data exfiltration

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle underlies the routine activity theory in adversarial modeling?

Crimes are random and cannot be predicted spatially.

Three elements—offender, target, and guardian—must converge for crime to occur.

Offenders act irrationally under technological influence.

Guardianship alone determines crime occurrence.

Motivation and opportunity are unrelated.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A crime attractor in the cyber domain refers to:

A server with high availability and poor security settings

A government-controlled data repository

A honeypot designed to trap cybercriminals

A decentralized marketplace for cryptocurrencies

A secure node within a blockchain network

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which adversary is most likely to perform long-term espionage rather than immediate disruption?

Hacktivists

Cyber-dependent criminals

State-sponsored actors

Script kiddies

Financial malware operators

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which element is NOT typically part of a cyber-dependent criminal operation?

Affiliate program

Command-and-control infrastructure

Legitimate regulatory oversight

Infection vectors

Specialized exploit kits

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The disinhibition effect in cyber-enabled crime implies that:

Cybercriminals reduce their activity under online anonymity

Individuals behave more extremely online—positively or negatively

The anonymity of the Internet enforces ethical restraint

Machine learning models inhibit cyber aggression

Victims become desensitized to cyberbullying

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?