Copyright

Impact of Cybercrime on Electronic Communication Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. How do cyber criminals often make emails look more legitimate to trick their recipients?

Question 2 2. How is spam email used in cybercrimes?

Question 3 3. What is ransomware?

Question 4 4. Which of these is NOT text-based?

Question 5 5. What is an advantage of CMC?

Page 2

Question 6 6. What is a disadvantage of CMC?

Question 7 7. Which type of software can be used by social media to gain access to your personal information?

Question 8 8. Eric has received a Facebook message from someone he recognizes as a friend, asking him to click a link to view a video. What should Eric do?

Question 9 9. How can cybercriminals use social networking to commit crimes in real life?

Question 10 10. The rise in the use of cell phones to commit cybercrimes could be attributed to all of these factors EXCEPT which?

Page 3

Question 11 11. How can cell phone and smart phone applications be used to commit cyber crimes?

Question 12 12. What is the best way to protect a cell phone's operating system from exploitation by cybercriminals?

Question 13 13. Let's say you are going on vacation for exactly two weeks and no one will be watching your house. You share that information online with everyone on all of your social media pages. What is this an example of?

Question 14 14. Which of the following can be classified as a cybercrime?

Question 15 15. Why do scammers like to spoof email addresses and phone numbers?

Page 4

Question 16 16. Which of the following is TRUE about how flawed computer software aids the execution of a Cyber Attack?

Question 17 17. How do computers contribute to the spread of malware used in a cyber attack?

Question 18 18. In a Distributed Denial of Service (DDoS) attack, the attacker takes control of other users' computing devices in order to _____.

Question 19 19. What is the main benefit of using chat applications?

Question 20 20. Facebook does NOT enable businesses to _____.

Page 5

Question 21 21. Many businesses today have changed their approach to marketing in all of the following ways EXCEPT:

Question 22 22. Instant messaging programs can be used to send files or links. What is the potential problem with this?

Question 23 23. Instant messaging platforms are common among cyber criminals for all of the following reasons EXCEPT which?

Question 24 24. Cyber criminals can hack instant messaging conversations, whether personal or professional, which can create _____ concerns.

Question 25 25. Tom's boss has emailed him asking him to wire $5 million to an offshore account to assist with the purchase of an international copy. What should Tom's next move be?

Page 6

Question 26 26. Which of these is NOT a form of synchronous computer mediated communications?

Question 27 27. How is social engineering used in cybercrimes on social networking sites?

Question 28 28. This threat, used by cybercriminals to infiltrate cell phones and their infrastructure, involves stealing data through a Bluetooth connection:

Question 29 29. The criminal justice system now uses __________ as a tool to help track, identify, and solve crimes that happen both online and offline.

Question 30 30. Which statement is FALSE about phishing as a cyber attack approach?

Impact of Cybercrime on Electronic Communication Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Computer Science 110: Introduction to Cybersecurity  /  Computer Science Courses
Support