Computers as a Means for Cybercrime


Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

Which of the following is TRUE about how flawed computer software aids the execution of a Cyber Attack?

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 79,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. Which statement is FALSE about phishing as a cyber attack approach?

2. How do computers contribute to the spread of malware used in a cyber attack?

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

Get some idea of how much you know about computers as a means of cybercrime with these study assessments. You'll be required to know about the way flawed computer software aids a cyber attack, among other topics.

Quiz & Worksheet Goals

The quiz will test your grasp of:

  • The characteristics of phishing
  • The way computers contribute to the spread of malware
  • A Distributed Denial of Service (DDoS) attack

Skills Practiced

  • Making connections - use your understanding of cyber attacks and how they're connected to computers and malware
  • Knowledge application - use your knowledge to answer questions about how flawed computer software contributes to a cyber attack
  • Information recall - access the knowledge you've gained regarding the attributes of phishing during a cyber attack

Additional Learning

For more information on cyber attacks, take some time to review the lesson named Computers as a Means for Cybercrime. You'll be covering the following points as you go along:

  • Vulnerabilities in core operating systems
  • Malicious SQL queries
  • Details about the execution of cyber attacks