This quiz titled 'Computer Technology and the Internet' explores various aspects of cybercrime, including hacking, DDoS attacks, and computer worms. It assesses knowledge on how cybercrimes utilize technology and the Internet, aiming to enhance understanding of cybersecurity measures.
True
False
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
Web defacement
Password cracking
Denial of service attack
The man-in-the middle attack
None of the above
Rate this question:
Copyright infringement
Embezzlement
Cyberharassment
Phishing
All of the above
Rate this question:
Pyramid
Ponzi
Pump and dump
Cybersmear
None of the above
Rate this question:
Hacking into a computer and obtain the individuals private data
Stealing their mail
Bribing an employee that has access to the victim's personal data
A and c
All of the above
Rate this question:
Non-content data
Content data
Traffic data
Location data
None of the above
Rate this question:
Worm
Virus
Trojan horse
Both a and b
All of the above
Rate this question:
Wife
Roommate
Son-in-law/daughter-in-law
Boyfriend/girlfriend
All of the above
Rate this question:
Stay-at-home mothers
Disabled individuals
Persons who are unemployed
Individuals that are desperately seeking some form of income
All of the above
Rate this question:
Adware
Spyware
A computer virus
A worm
None of the above
Rate this question:
Government agencies
Law enforcement agencies
Citizens
Both a and b
All of the above
Rate this question:
Virus
Spyware
Denial of service attack
Both a and b
All of the above
Rate this question:
True
False
Rate this question:
The lock on the locker was provided by the employer
The lock on the locker was provided by the employee
A policy for searching lockers existed in the company
Both a and c
All of the above
Rate this question:
Block communications systems
Disrupt air traffic control
Shut down electric utilities
Contaminate water
All of the above
Rate this question:
Testimonial
Demonstrative
Documentary
Direct
None of the above
Rate this question:
Electronic Communications Privacy Act of 1986
Communications Assistance for Law Enforcement Act of 1994
Cable Communications Privacy Act of 1984
USA Patriot Act of 2001
None of the above
Rate this question:
Vishers
Phishers
Pharmers
Spammers
None of the above
Rate this question:
Hacking
Extortion
Malware
Both a and c
All of the above
Rate this question:
Telephone numbers
Customer information
Dialed numbers
None of the above
All of the above
Rate this question:
The crime (or crimes) being investigated
The location to be searched
The items to be seized
Both b and c
All of the above
Rate this question:
Financial identity theft
Criminal identity theft
Identity cloning
Commercial identity theft
None of the above
Rate this question:
Obtain a credit report and check your credit score
Check bank accounts frequently for unusual activity
Shred documents containing personal information before you discard them
Both b and c
All of the above
Rate this question:
Preponderance of evidence
Beyond a reasonable doubt
Clear and convincing evidence
Both a and c
All of the above
Rate this question:
True
False
Rate this question:
Financial identity theft
Criminal identity theft
Identity cloning
Commercial identity theft
None of the above
Rate this question:
Physical evidence
Direct evidence
Demonstrative evidence
Hearsay evidence
None of the above
Rate this question:
Pyramid
Ponzi
Pump and dump
Cybersmear
None of the above
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
The configuration of the software and hardware
The overall size and complexity of the computer system
The technical demands of the search
Both b and c
All of the above
Rate this question:
Daubert standard
Coppolino standard
Frye standard
None of the above
All of the above
Rate this question:
Consent
Search incident to arrest
Plain view
Border searches
All of the above
Rate this question:
Bootleg
Counterfeit
Stolen
Both a and b
None of the above
Rate this question:
Defines the types of records that must be recorded and for how long
Deals with falsification and destruction of data
Holds executives directly responsible for problems
Defines e-mails as corporate documents
All of the above
Rate this question:
Virus attacks
Worm attacks
Denial of Service attacks
Distributed Denial of Service attacks
None of the above
Rate this question:
The Privacy Act of 1974
Privacy Protection Act of 1980
Telecommunications Act of 1996
Electronic Freedom of Information Act of 1996
None of the above
Rate this question:
Pyramid
Ponzi
Pump and dump
Cybersmear
None of the above
Rate this question:
Trade secrets
Copyright
Trademarks
Patents
None of the above
Rate this question:
Acquisition, identification, extraction, and presentation
Acknowledgement, identification, extraction, and presentation
Acquisition, identification, evaluation, and presentation
Identification, acquisition,evaluation, and presentation
None of the above
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.