Cell Phones & Cell Phone Infrastructure in Cybercrime

Instructions:

Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

The rise in the use of cell phones to commit cybercrimes could be attributed to all of these factors EXCEPT which?

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 79,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. This threat, used by cybercriminals to infiltrate cell phones and their infrastructure, involves stealing data through a Bluetooth connection:

2. How can cell phone and smart phone applications be used to commit cyber crimes?

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

In this worksheet/quiz combo, we provide you with a series of multiple-choice questions designed to test your understanding of the role cell phones and their infrastructure play in cybercrime. Questions cover topics such as the threat that involves stealing data through a Bluetooth connection and how to best protect a cell phone operating system from criminal exploitation.

Quiz & Worksheet Goals

Take this quiz to see if you know the following:

  • Factors that may or may not be behind the increasing use of cell phones to commit cybercrime
  • Which cybercriminal threat involves stealing data through a Bluetooth connection
  • The use of phone applications in cybercrime
  • How to protect a cell phone operating system from cybercriminal exploitation
  • What you need to understand about what your applications are requesting

Skills Practiced

  • Knowledge application - use your knowledge to answer questions about what the rise in the use of cell phones used to commit cybercrimes might be attributed to
  • Interpreting information - make sure you can read information about protecting your phone and interpret it correctly
  • Information recall - access the knowledge you've gained about how cell phone and smart phone applications can be used to commit cybercrimes

Additional Learning

Our lesson titled Cell Phones & Cell Phone Infrastructure in Cybercrime is an engaging way to learn more about this subject. Once you finish this lesson, you should be ready to:

  • Detail the Googligan malware episode
  • Discuss when more people started using cell phones than personal computers to access the internet
  • Outline browser-based attacks and what they look like
Support