Cyber Crime Awareness Quiz Test

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Tsdikshit
T
Tsdikshit
Community Contributor
Quizzes Created: 1 | Total Attempts: 8,143
Questions: 10 | Attempts: 8,147

SettingsSettingsSettings
Cyber Crime Awareness Quiz Test - Quiz

DOW Exam


Questions and Answers
  • 1. 

    A coffee shop that collects payments from customers by debit / credit cards would be liable under the data privacy law

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A coffee shop that collects payments from customers by debit/credit cards would be liable under the data privacy law because they are handling sensitive financial information of their customers. The data privacy law is designed to protect personal information and ensure that businesses handle it securely. Collecting payments through debit/credit cards involves storing and processing customer data, which makes the coffee shop responsible for protecting that data from unauthorized access or breaches. Therefore, they would be liable under the data privacy law.

    Rate this question:

  • 2. 

    A hacker can use a remote administration Trojan to shutdown an infected computer even if the power is switched off in the victim computer.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    A remote administration Trojan is a type of malware that allows a hacker to gain unauthorized access to a victim's computer. While it can enable the hacker to perform various malicious activities on the infected computer, such as stealing data or controlling it remotely, it does not have the capability to turn on or shut down the computer if the power is switched off. Therefore, the statement that a hacker can use a remote administration Trojan to shutdown an infected computer even if the power is switched off is false.

    Rate this question:

  • 3. 

    A Social engineer convinces a person to give him sensitive information without his knowledge.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    In this scenario, the statement is describing a situation where a social engineer is able to manipulate and deceive a person into unknowingly divulging sensitive information. This is a common tactic used by social engineers, who often rely on psychological manipulation and social skills to exploit human vulnerabilities. Therefore, the answer "True" indicates that the statement accurately describes a social engineering technique.

    Rate this question:

  • 4. 

    How to trace website ?

    • A.

      Http://www.domaintools.com/

    • B.

      Http://www.readnotify.com/

    • C.

      Http://www.pro.slinteractive.com.au/

    • D.

      Http://www.defaultpassword.com/

    Correct Answer
    A. Http://www.domaintools.com/
    Explanation
    The given answer, http://www.domaintools.com/, is the correct answer for tracing a website. DomainTools is a website that provides various tools for investigating and analyzing domains, including domain ownership information, DNS records, and historical data. By using DomainTools, users can trace the details and history of a website, such as its registration information, IP address, and any associated domains or subdomains. This can be helpful for identifying the owner of a website, checking its credibility, or investigating any suspicious activities.

    Rate this question:

  • 5. 

    What is the google hacking code for Email ?

    • A.

      Intitle:index.of milebox

    • B.

      Index:intitle.of inbox

    • C.

      Index.of inbox:intitle

    • D.

      Intitle:index.of inbox

    Correct Answer
    D. Intitle:index.of inbox
    Explanation
    The correct answer is "intitle:index.of inbox". This code is used in Google hacking to search for email inboxes that have been indexed by Google. By using the "intitle:" operator, it specifies that the search should focus on the title of the webpage. The "index.of" part indicates that the search is looking for directories or indexes. And finally, "inbox" specifies that the search is specifically for email inboxes.

    Rate this question:

  • 6. 

    What are types of password attack ?

    • A.

      Electronic Attack

    • B.

      Non electronic attack

    • C.

      Man in middle attack

    • D.

      Shoulder surfing

    Correct Answer
    B. Non electronic attack
  • 7. 

    What is SQL code among the 4 option ?

    • A.

      ' or '1'='1' -- '

    • B.

      '' OR '1'='1';

    • C.

      ' or '1'='1

    • D.

      't' = 't';

    Correct Answer
    C. ' or '1'='1
    Explanation
    The correct answer is "' or '1'='1'". This is an example of a SQL code injection attack. It is a technique used by hackers to exploit vulnerabilities in a website's database. In this case, the code is attempting to bypass any authentication checks by making the statement '1'='1' always evaluate to true, allowing unauthorized access to the database.

    Rate this question:

  • 8. 

    To understand your ip address which add on do you use ?

    • A.

      Extreme ip

    • B.

      Show ip

    • C.

      Noscript

    • D.

      Hide my ip

    Correct Answer
    A. Extreme ip
    Explanation
    Extreme IP is the add-on that can be used to understand your IP address.

    Rate this question:

  • 9. 

    Which of the following is an effective way to protect yourself from cybercrime?

    • A.

      Using the same password for all your online accounts

    • B.

      Clicking on suspicious links in unsolicited emails

    • C.

      Installing and regularly updating antivirus software

    • D.

      Sharing your personal information on unsecured websites

    Correct Answer
    C. Installing and regularly updating antivirus software
    Explanation
    One effective way to protect yourself from cybercrime is to install and regularly update antivirus software. This software helps detect and prevent malicious attacks, such as viruses, ransomware, or malware, from infecting your device. Using strong, unique passwords and avoiding suspicious links are also important safety measures, but answers A (using the same password), B (clicking on suspicious links), and D (sharing personal information on unsecured websites) increase your risk of becoming a victim of cybercrime.

    Rate this question:

  • 10. 

    Which of the following is an example of phishing, a common cybercrime?

    • A.

      Installing antivirus software to protect your computer

    • B.

      Receiving an email that asks you to click a link and provide personal information

    • C.

      Backing up data to a secure external drive

    • D.

      Using a strong, unique password for each account

    Correct Answer
    B. Receiving an email that asks you to click a link and provide personal information
    Explanation
    Phishing is a cybercrime where attackers impersonate legitimate organizations or individuals through email, text messages, or websites to trick people into revealing sensitive information like passwords, credit card details, or personal identification. The example of receiving an email asking for personal information is a typical phishing attempt. The other options describe good cybersecurity practices rather than forms of cybercrime.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Sep 09, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 30, 2014
    Quiz Created by
    Tsdikshit
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.