Computer Crime, Privacy, And Security Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Sharvey2014
S
Sharvey2014
Community Contributor
Quizzes Created: 1 | Total Attempts: 4,958
| Attempts: 4,958 | Questions: 32
Please wait...
Question 1 / 32
0 %
0/100
Score 0/100
1. Adware is a form of spyware that generates annoying pop-up and banner ads.

Explanation

Adware is a type of software that displays unwanted advertisements, usually in the form of pop-up windows or banners. It is considered a form of spyware because it collects information about the user's browsing habits and interests in order to display targeted ads. These ads can be disruptive and intrusive, often appearing without the user's consent. Therefore, the statement that adware generates annoying pop-up and banner ads is true.

Submit
Please wait...
About This Quiz
Computer Crime, Privacy, And Security Quiz - Quiz

What do you know about cybercrime and cybersecurity? So, are you ready for this computer crime, privacy, and security quiz? Cybercrime which is also called computer crime, is... see moreknown as the use of a computer as a tool to further illegal ends. Examples of these are committing fraud, trafficking in child pornography as well as intellectual property, identity theft, or violating privacy. These questions will educate you more about computer crime and security. All the best to you!
see less

2. To ensure one's privacy at work, refrain from making personal calls on a work phone and avoid using company email for personal purposes.

Explanation

The statement suggests that in order to maintain privacy at work, it is important to avoid making personal calls on a work phone and using company email for personal purposes. This is because using work resources for personal matters can potentially compromise privacy and blur the boundaries between personal and professional life. Therefore, the answer "True" indicates that the statement is correct.

Submit
3. Cookies cannot be disabled.

Explanation

This statement is false because cookies can indeed be disabled. Cookies are small text files stored on a user's device that track their activity on a website. Users have the option to disable cookies in their web browser settings, which prevents websites from storing or accessing cookies on their device. Disabling cookies can help enhance privacy and security by preventing tracking and targeted advertising. Therefore, the correct answer is false.

Submit
4. A global unique identifier is an identification number produced by software or a piece of hardware.

Explanation

A global unique identifier, often abbreviated as GUID, is indeed an identification number that is generated by software or hardware. This identifier is globally unique, meaning it is highly improbable for two different entities to have the same GUID. It is commonly used in various computer systems and databases to uniquely identify objects, records, or entities.

Submit
5. To avoid having to remember your passwords and account numbers, always save them on your computer.

Explanation

Saving passwords and account numbers on a computer is not a secure practice. It increases the risk of unauthorized access to sensitive information. Storing passwords and account numbers on a computer can make them vulnerable to hacking, malware, or theft. It is recommended to use secure password managers or other offline methods to store and manage passwords and account numbers.

Submit
6. ________________ is a kind of denial of service attack in which SYN packets are repeatedly sent to every port on the server using fake IP addresses.

Explanation

Syn flooding is a type of denial of service attack where SYN packets are continuously sent to every port on the server using fake IP addresses. This overwhelms the server's resources and prevents it from responding to legitimate requests, causing a denial of service for legitimate users. This attack takes advantage of the TCP handshake process, where the attacker sends numerous SYN packets but never completes the handshake, tying up server resources and rendering it inaccessible to others.

Submit
7. To protect your privacy online, fill out forms only when the website displays

Explanation

The correct answer is "https:" because the "https:" protocol is used for secure communication over a computer network. When a website displays "https:" in its URL, it means that the data transmitted between the user's browser and the website is encrypted and secure from potential eavesdropping or tampering. This ensures the privacy and protection of personal information entered into forms on the website.

Submit
8. Passwords should consist of _______________

Explanation

Passwords should consist of a combination of lowercase letters, numbers, uppercase letters, and special characters. This combination helps to enhance the complexity and strength of the password, making it more difficult for hackers to guess or crack. Including a variety of character types increases the number of possible combinations, making the password more secure. Using personal information such as pets' names or names of people close to you can make the password easier to guess, so it is generally recommended to avoid using such information in passwords.

Submit
9. Alexa protects her privacy at school by never giving out her login password  and by having Safari save her login password to her Gmail account.

Explanation

The statement is false because saving login passwords to a Gmail account does not protect privacy at school. Sharing login passwords or storing them in an email account can compromise privacy and security. It is important to keep login credentials confidential and not share them with others.

Submit
10. _________________  activities committed using the Internet  that violate state, federal, or international laws.

Explanation

Cybercrime refers to illegal activities conducted using the Internet that violate state, federal, or international laws. This can include hacking, online fraud, identity theft, spreading malware, and other malicious activities. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, or cause financial harm. The term "cybercrime" encompasses a wide range of illegal activities committed in the digital realm, highlighting the growing need for cybersecurity measures to protect individuals, organizations, and governments from these threats.

Submit
11. IP ____________ sends a message with an IP address disguised as a message from a trusted source.

Explanation

Spoofing is the correct answer because it involves sending a message with an IP address disguised as a message from a trusted source. This technique is commonly used by hackers to deceive recipients into thinking that the message is coming from a legitimate source, allowing them to gain unauthorized access or extract sensitive information. Spoofing can be done through various protocols, such as IP spoofing, email spoofing, or caller ID spoofing.

Submit
12. Only a small minority of U.S. employers observe employee phone calls, e-mails, Web browsing habits, and computer files.

Explanation

The statement is True. While there may be some employers who observe employee phone calls, emails, web browsing habits, and computer files, it is only a small minority of them. This means that the majority of U.S. employers do not engage in such monitoring practices. However, it’s important to note that under federal law, employers may monitor employee conversations if the monitoring occurs in the ordinary course of business or if there is employee consent.

Submit
13. Computer crimes and cyber crimes are the same type of crimes.

Explanation

Computer crimes and cyber crimes are not the same type of crimes. While they are related, they have distinct differences. Computer crimes refer to illegal activities that involve the use of a computer as a tool or target, such as hacking, unauthorized access, or data theft. On the other hand, cyber crimes encompass a broader range of criminal activities that occur in the digital realm, including computer crimes but also online fraud, identity theft, phishing, and more. Therefore, it is incorrect to consider them as the same type of crimes.

Submit
14. An individual's ability to restrict or eliminate the collection, use, and sale of his/her confidential personal information

Explanation

Privacy refers to an individual's ability to restrict or eliminate the collection, use, and sale of his/her confidential personal information. It is an important aspect of ethics and protection, as it ensures that individuals have control over their personal data and can maintain their anonymity. Privacy allows individuals to determine who has access to their personal information and how it is used, thereby safeguarding their confidentiality and ensuring their personal autonomy.

Submit
15. _______________ is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems

Explanation

A honeypot is a trap set to detect, deflect, or counteract attempts at unauthorized use of information systems. It is designed to attract and deceive potential attackers, making them believe they have found a vulnerable target. By luring hackers or cybergangs into the honeypot, organizations can gather information about their tactics, techniques, and intentions, and use this knowledge to enhance their security measures. Honeypots can also be used to divert attackers' attention away from real systems and protect sensitive data from being compromised.

Submit
16. An area of law dedicated to computer crime

Explanation

Cyberlaw refers to the area of law that deals with legal issues related to computer crimes. It encompasses various aspects such as hacking, online fraud, identity theft, and illegal activities conducted on the internet. Cyberlaw aims to establish guidelines and regulations to prevent and prosecute cybercrimes, as well as protect individuals and organizations from digital threats. It also addresses issues such as online privacy, intellectual property rights, and electronic transactions. Therefore, cyberlaw is the correct answer as it specifically focuses on the legal framework surrounding computer crimes.

Submit
17. _______ are transparent graphic images placed on a Web site or in an e-mail used to monitor Web or e-mail behavior

Explanation

Beacons are transparent graphic images that are placed on a website or in an email to monitor web or email behavior. They are often used by marketers to track user interactions, such as opening an email or visiting a specific webpage. Beacons allow companies to gather data on user behavior, such as the number of times an email is opened or the pages visited on a website. This information can then be used to analyze user engagement and tailor marketing strategies accordingly.

Submit
18. The following is an example of ______________. Bromley opened an email that he thought was from his friend, but the email contained spyware, and it obtained all of his banking account information.

Explanation

The given scenario is an example of phishing attacks. Phishing attacks involve sending deceptive emails or messages that appear to be from a trusted source, such as a friend or a legitimate organization, with the intention of tricking the recipient into revealing sensitive information or downloading malicious software. In this case, Bromley opened an email that he believed was from his friend, but it turned out to be a phishing attempt that resulted in the installation of spyware and the theft of his banking account information.

Submit
19. The following is an example of ______________. A cashier at a restaurant steals $0.05 from every bill she processes.

Explanation

The given scenario is an example of "salami slicing." Salami slicing refers to a method of stealing small amounts of money or data over a long period of time, with the hope that the theft will go unnoticed. In this case, the cashier steals $0.05 from each bill, which may seem insignificant individually but can accumulate to a substantial amount over time. This method allows the thief to avoid suspicion as the theft is spread out and not easily noticeable.

Submit
20. The act of secretly removing RAM chips from office computers and selling them

Explanation

Memory shaving refers to the act of secretly removing RAM chips from office computers and selling them. This is a form of theft as it involves unlawfully taking and selling someone else's property. It is different from software piracy, which involves the unauthorized copying and distribution of software, and salami slicing, which refers to a financial crime that involves stealing small amounts of money from many different accounts.

Submit
21. In data dibbling, a criminal obtains personal information to impersonate you.

Explanation

In data dibbling, a criminal does not obtain personal information to impersonate you. This statement implies that data dibbling involves obtaining personal information for the purpose of impersonation, which is incorrect. Data dibbling refers to the unauthorized access or manipulation of data, but it does not necessarily involve identity theft or impersonation.

Submit
22. Viruses can spread via

Explanation

Viruses can spread through various means, including email attachments, flash drives, and downloading software. Email attachments can contain infected files that, when opened, can infect the recipient's computer. Flash drives can carry viruses that can be transferred to other devices when connected. Downloading software from untrusted sources can also lead to virus infections, as the software may contain malware. Therefore, it is important to exercise caution when dealing with email attachments, flash drives, and downloading software to prevent the spread of viruses.

Submit
23. Maleek used several fake e-mails and social engineering to trick several coworkers into giving him their personal information.  This is an example.

Explanation

Spear phishing is the correct answer because Maleek used fake emails and social engineering techniques to specifically target and trick his coworkers into revealing their personal information. Unlike regular phishing attacks that cast a wide net, spear phishing involves personalized and targeted attacks, making it more effective in obtaining sensitive information.

Submit
24. To protect one's privacy online, individuals should

Explanation

To protect one's privacy online, individuals should use software that protects anonymity, such as Anonymous Surfing. This software helps to hide the user's IP address and encrypt their internet connection, making it difficult for others to track their online activities. Additionally, using throwaway email addresses can prevent personal information from being linked to a permanent email account. Turning off cookies can also enhance privacy as it prevents websites from tracking and storing user information. By following these practices, individuals can minimize the risk of their personal information being compromised online.

Submit
25. ______ are unsolicited messages sent via a cell phone or instant messaging service.

Explanation

Spim refers to unsolicited messages sent via a cell phone or instant messaging service. It is similar to spam emails but specifically targets mobile devices and messaging apps. Unlike viruses or spyware, spim does not aim to infect or harm devices but rather to annoy or deceive users with unwanted messages.

Submit
26. Legislation currently in place in the United States to protect consumers from the computer and cyber crimes includes the

Explanation

The Health Insurance Portability and Privacy Act (HIPAA) is a legislation in the United States that protects consumers' health information and ensures its privacy. It establishes national standards for the security and confidentiality of individuals' medical records and other personal health information. The Family Education Rights and Privacy Act (FERPA) is another legislation that protects the privacy of students' education records. It gives parents certain rights with respect to their children's education records, such as the right to access and amend the records. Both acts play a crucial role in safeguarding consumers' personal information and protecting them from computer and cyber crimes.

Submit
27. The following is an example of ______________. Katherine often goes through her employers' garage cans and locates discarded files of their clients, and opens credit card accounts in their names.

Explanation

The given scenario describes dumpster diving, which is the act of searching through trash or discarded items to find valuable or sensitive information. In this case, Katherine is going through her employers' garbage cans to find discarded files of their clients and using that information to open credit card accounts in their names. This is a clear example of identity theft, as she is using someone else's personal information without their consent for fraudulent purposes.

Submit
28. Types of rogue programs include

Explanation

The given answer is a list of types of rogue programs. Rogue programs are malicious software that can cause harm to a computer system. Time bombs are programs that are designed to activate or cause damage at a specific time or date. Worms are self-replicating programs that spread across networks and can cause damage. Keyloggers are programs that record keystrokes, allowing attackers to capture sensitive information such as passwords. Therefore, the correct answer includes time bombs, worms, and keyloggers as types of rogue programs.

Submit
29. These rogue programs remain dormant until triggered or activated.

Explanation

The given statement describes rogue programs that stay inactive until a specific event or condition occurs, at which point they become active and carry out their intended actions. This behavior is characteristic of both time bombs and logic bombs. Time bombs are programmed to activate at a specific date or time, while logic bombs are triggered by a specific logical condition being met. Therefore, both time bombs and logic bombs fit the description provided in the statement.

Submit
30. RFID are used by used by stores to control ___________ and to identify lost  ___________and gather information about individuals from their _________

Explanation

RFID technology is utilized by stores to manage their inventory efficiently. By tagging products with RFID tags, stores can track and control their stock levels more accurately. Additionally, RFID tags are also used to identify lost passports, enabling authorities to locate and return them to their owners. Similarly, RFID tags are employed to identify and track pets, ensuring their safety and aiding in reuniting them with their owners. The technology can also be used to gather information about individuals through their passports, providing valuable insights for various purposes.

Submit
31. Examples of ubiquitous computing include the use of

Explanation

Ubiquitous computing refers to the concept of seamlessly integrating technology into our everyday lives. Active badges and smartphones are both examples of this, as they are devices that are constantly present and used by individuals. Active badges are wearable devices that track a person's location and provide information about their activities, while smartphones are handheld devices that have become essential for communication, internet access, and various other tasks. Both of these examples demonstrate how technology has become pervasive and integrated into our daily routines.

Submit
32. Technologies that jeopardize anonymity

Explanation

The technologies mentioned in the answer, namely cookies, GUIDs, and Radio Frequency Identification (RFID), can jeopardize anonymity. Cookies are small text files stored on a user's computer that track their online activities, potentially revealing personal information. GUIDs (Globally Unique Identifiers) are unique identifiers assigned to devices or users, making it easier to track their actions. RFID uses radio waves to identify and track objects or individuals, compromising anonymity if used without proper safeguards. Bluetooth, which is not mentioned in the answer, is a wireless technology for short-range communication and does not directly jeopardize anonymity.

Submit
View My Results

Quiz Review Timeline (Updated): Nov 14, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Nov 14, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 18, 2013
    Quiz Created by
    Sharvey2014
Cancel
  • All
    All (32)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Adware is a form of spyware that generates annoying pop-up and banner...
To ensure one's privacy at work, refrain from making personal calls on...
Cookies cannot be disabled.
A global unique identifier is an identification number produced by...
To avoid having to remember your passwords and account numbers, always...
________________ is a kind of denial of service attack in which SYN...
To protect your privacy online, fill out forms only when the website...
Passwords should consist of _______________
Alexa protects her privacy at school by never giving out her login...
_________________  activities committed using the Internet ...
IP ____________ sends a message with an IP address disguised as a...
Only a small minority of U.S. employers observe employee phone calls,...
Computer crimes and cyber crimes are the same type of crimes.
An individual's ability to restrict or eliminate the collection,...
_______________ is a trap set to detect, deflect, or in some manner...
An area of law dedicated to computer crime
_______ are transparent graphic images placed on a Web site or in an...
The following is an example of ______________. Bromley opened an email...
The following is an example of ______________. A cashier at a...
The act of secretly removing RAM chips from office computers and...
In data dibbling, a criminal obtains personal information to...
Viruses can spread via
Maleek used several fake e-mails and social engineering to trick...
To protect one's privacy online, individuals should
______ are unsolicited messages sent via a cell phone or instant...
Legislation currently in place in the United States to protect...
The following is an example of ______________. Katherine often goes...
Types of rogue programs include
These rogue programs remain dormant until triggered or activated.
RFID are used by used by stores to control ___________ and to identify...
Examples of ubiquitous computing include the use of
Technologies that jeopardize anonymity
Alert!

Advertisement