Computer Crime, Privacy, And Security Quiz

32 Questions | Attempts: 4349
Share

SettingsSettingsSettings
Computer Crime, Privacy, And Security Quiz - Quiz

What do you know about cybercrime and cybersecurity? So, are you ready for this computer crime, privacy, and security quiz? Cybercrime which is also called computer crime, is known as the use of a computer as a tool to further illegal ends. Examples of these are committing fraud, trafficking in child pornography as well as intellectual property, identity theft, or violating privacy. These questions will educate you more about computer crime and security. All the best to you!


Questions and Answers
  • 1. 
    ________________ is a kind of denial of service attack in which SYN packets are repeatedly sent to every port on the server using fake IP addresses.
    • A. 

      Cybergaming crime

    • B. 

      Memory shaving

    • C. 

      Syn flooding

    • D. 

      Software piracy

  • 2. 
    Only a small minority of U.S. employers observe employee phone calls, e-mails, Web browsing habits, and computer files
    • A. 

      True

    • B. 

      False

  • 3. 
    Computer crimes and cyber crimes are the same type of crimes.
    • A. 

      True

    • B. 

      False

  • 4. 
    In data dibbling, a criminal obtains personal information to impersonate you.
    • A. 

      True

    • B. 

      False

  • 5. 
    Technologies that jeopardize anonymity
    • A. 

      Cookies

    • B. 

      Global Positioning System

    • C. 

      GUIDs

    • D. 

      Radio Frequency Identification

    • E. 

      Bluetooth

  • 6. 
    To protect one's privacy online, individuals should
    • A. 

      Use software that protects anonymity, such as Anonymous Surfing

    • B. 

      Only give out personal information via Facebook.

    • C. 

      Use throwaway email addresses.

    • D. 

      Turn off cookies

  • 7. 
    IP ____________ sends a message with an IP address disguised as a message from a trusted source.
    • A. 

      Address

    • B. 

      Man

    • C. 

      Spoofing

    • D. 

      Protocol

  • 8. 
    _______________ is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems
    • A. 

      Hackers

    • B. 

      Cybergangs

    • C. 

      IP spoofing

    • D. 

      Honeypot

  • 9. 
    The act of secretly removing RAM chips from office computers and selling them
    • A. 

      Theft

    • B. 

      Memory shaving

    • C. 

      Software piracy

    • D. 

      Salami slicing

  • 10. 
    Alexa protects her privacy at school by never giving out her login password  and by having Safari save her login password to her Gmail account.
    • A. 

      True

    • B. 

      False

  • 11. 
    To ensure one's privacy at work, refrain from making personal calls on a work phone and avoid using company email for personal purposes.
    • A. 

      True

    • B. 

      False

  • 12. 
    The following is an example of ______________. A cashier at a restaurant steals $0.05 from every bill she processes.
    • A. 

      Salami slicing

    • B. 

      Memory shaving

    • C. 

      Data dibbling

    • D. 

      Forgery

  • 13. 
    An area of law dedicated to computer crime
    • A. 

      Cyberlaw

    • B. 

      Cyberbulling

    • C. 

      Cyberstalking

    • D. 

      Cybercrime

  • 14. 
    Maleek used several fake e-mails and social engineering to trick several coworkers into giving him their personal information.  This is an example.
    • A. 

      Identity theft

    • B. 

      Dumpster diving

    • C. 

      Phishing attacks

    • D. 

      Spear phishing

  • 15. 
    The following is an example of ______________. Bromley opened an email that he thought was from his friend, but the email contained spyware, and it obtained all of his banking account information.
    • A. 

      Identify theft

    • B. 

      Phishing attacks

    • C. 

      Dumpster diving

    • D. 

      Spear phishing

  • 16. 
    The following is an example of ______________. Katherine often goes through her employers' garage cans and locates discarded files of their clients, and opens credit card accounts in their names.
    • A. 

      Identify theft

    • B. 

      Phishing attacks

    • C. 

      Dumpster diving

    • D. 

      Spear phishing

  • 17. 
    Legislation currently in place in the United States to protect consumers from the computer and cyber crimes includes the
    • A. 

      Fair Credit Bill Act

    • B. 

      Health Insurance Portability and Privacy Act

    • C. 

      Fair Health and Education Act

    • D. 

      Family Education Rights and Privacy Act

  • 18. 
    To protect your privacy online, fill out forms only when the website displays
    • A. 

      Http://

    • B. 

      Ftps://

    • C. 

      Ftp://

    • D. 

      Https:

  • 19. 
    These rogue programs remain dormant until triggered or activated.
    • A. 

      Nuclear bombs

    • B. 

      Worms

    • C. 

      Time bomb

    • D. 

      Logic bomb

  • 20. 
    ______ are unsolicited messages sent via a cell phone or instant messaging service.
    • A. 

      Spam

    • B. 

      Virus

    • C. 

      Spyware

    • D. 

      Spim

  • 21. 
    Cookies cannot be disabled.
    • A. 

      True

    • B. 

      False

  • 22. 
    An individual's ability to restrict or eliminate the collection, use, and sale of his/her confidential personal information
    • A. 

      Ethics

    • B. 

      Protection

    • C. 

      Anonymity

    • D. 

      Privacy

  • 23. 
    A global unique identifier is an identification number produced by software or a piece of hardware.
    • A. 

      True

    • B. 

      False

  • 24. 
    Examples of ubiquitous computing include the use of
    • A. 

      Active badges

    • B. 

      Cookies

    • C. 

      Smartphones

    • D. 

      Remote control

  • 25. 
    Viruses can spread via
    • A. 

      Email attachments

    • B. 

      Flash drives

    • C. 

      Downloading software

    • D. 

      Chats

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.