Copyright

The Role of People in Cybercrime Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. Which statement below defines what cybercrime is?

Question 2 2. In which decade did the first known cybercrime occur?

Question 3 3. What is the name of the department created by the FBI to fight cybercrime?

Question 4 4. What are the guidelines called that were released by the Department of Defense in 2011?

Question 5 5. Which statement below is not one of the three categories of cybercrimes?

Page 2

Question 6 6.

Which of the following might be a victim of a white collar crime?

I. Individuals

II. Corporations

III. Charities

Question 7 7.

Which of the following is an example of a white collar crime?

I. Fraud

II. Embezzlement

III. Forgery

Question 8 8. Which of the following was a major risk factor that allowed Bernie Madoff to commit history's biggest white collar crime?

Question 9 9. Which of the following is NOT a characteristic of white collar crime?

Question 10 10. Which of the following people is at HIGHEST risk of being a victim of white collar crime?

Page 3

Question 11 11. Which of these tasks is a security manager potentially responsible for?

Question 12 12. Which of these roles uses encryption to develop software and protocols that will protect an organization from cybercrimes?

Question 13 13. This role on a cybersecurity team is tasked with thinking like a hacker to help thwart cybercrimes before they happen.

Question 14 14. What is the role of members of a business' cybersecurity team?

Question 15 15. What does a security engineer as part of a cybersecurity team do?

Page 4

Question 16 16. Which of the answers is not a sign of a phishing email?

Question 17 17. _____ software is designed to protect computers and electronic devices connected to the Internet from cybercriminals.

Question 18 18. What information should not be shared on social media site?

Question 19 19. Which of the following activities is not common with hacking?

Question 20 20. Identity theft is a tactic used by cyber criminals for the purpose of gaining _____ information.

Page 5

Question 21 21. Investigators of cybercrimes must possess objectivity, inquisitiveness and knowledge of _____.

Question 22 22. Victims of cybercrimes may suffer from all of these repercussions EXCEPT which?

Question 23 23. What is known about the profile of the common cybercriminal?

Question 24 24. Cybercriminals tend to share some similar characteristics. Which of these could that be?

Question 25 25. How can the use of technology influence cybercrime?

Page 6

Question 26 26. How many times a year should you update your operating system and important software?

Question 27 27. On a website that calls for you to enter your financial information the URL should include what letter after the http?

Question 28 28. The latest password security standards call for at least how many characters in a password?

Question 29 29. Leading antivirus software not only detect virus, but also:

Question 30 30. To make sure that charges to your financial accounts are legitimate, it is best to:

The Role of People in Cybercrime Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Computer Science 110: Introduction to Cybersecurity  /  Computer Science Courses
Support