Copyright

Basics of Cybercrime Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. A phishing attack that uses fraudulent website to capture sensitive information is known as what?

Question 2 2. Which of the following describes a technological response to phishing attacks?

Question 3 3. Which of these is NOT a reason that information is valuable?

Question 4 4. Who leaked information to WikiLeaks in 2013?

Question 5 5. Which of the following is NOT a threat/risk associated with Social Media?

Page 2

Question 6 6. Which of the following is NOT a Social Media website?

Question 7 7. Which type of social engineering attack might involve giving away USB drives with malware loaded on them?

Question 8 8. Social engineers use the same methods as _____, except they use technology.

Question 9 9. In a pharming attack, the goal of the criminal is to _____.

Question 10 10. Typical pharming attacks usually target _____.

Page 3

Question 11 11. The internet security threat referred to as 'pharming' can be described as _____.

Question 12 12. 'Computer security' focuses on hardware and software, while 'Internet security' focuses on _____.

Question 13 13. When technocriminals use computers to target people through social media this is referred to as _____

Question 14 14. Which of the following is a common technocrime committed over cell phones?

Question 15 15. Which of the following is a method for securing data by using special mathematical algorithms to convert the data into a scrambled code before transmission?

Page 4

Question 16 16. When Angela buys a new smartphone that uses retina scanning instead of a password, the phone is using _____ security.

Question 17 17. What is the most common type of cyber threat?

Question 18 18. What cyber threat may occur when computer updates are not performed?

Question 19 19. How did cybercrime initially start?

Question 20 20. Which of the following is an example of a cybercrime?

Page 5

Question 21 21. Which of the following is NOT a type of cyber crime?

Question 22 22. Which of the following is a characteristic of cyber crime?

Question 23 23. What type of information is typically subject to phishing attacks?

Question 24 24. Which of these was an example of a threat to the American economy?

Question 25 25. What is the most important thing you can do to protect yourself on Social Media?

Page 6

Question 26 26. What is the most common type of social engineering attack?

Question 27 27. The DNS cache acts as _____.

Question 28 28. In the digital world, precautionary steps taken to protect computing resources against cybercrime is called _____.

Question 29 29. Piracy committed by technocriminals using satellite dish equipment involves which of the following?

Question 30 30. Bill is the new Chief Technology Officer at Z Corp. He plans to use _____ to prevent theft and protect the integrity of Z Corps. data.

Basics of Cybercrime Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Computer Science 110: Introduction to Cybersecurity  /  Computer Science Courses
Support