Download - quiz crime.docx

Transcript
Page 1: quiz crime.docx

1.  Cybercrime is basically criminal activity done by using computers and the internet. A. True B. False

3.  Spam floods the internet and leaves people with no option other than to recieve it.

A. True B. False

4.  The act of stalking an individual through a group or electronic means is called cyberstalking.

A. True B. False

6.  Your social security number should not be kept private? A. True B. False

7. 

Identity Theft is a type of crime in which personal information is stolen to commit fraudulent activity.

A. True B. False

8.  Social networking sites have nothing to do with the percentage of missing kids annually.

A. True B. False

Page 2: quiz crime.docx

7What is a “Hacktivist”?

Page 3: quiz crime.docx

A)Politically motivated hacker

B)Denial of service attacker

C)A proponent of Napster

D)A person engaging in an intentional act involving a computer in which the person may have gained at the victim’s expense

Page 4: quiz crime.docx

19 What is the primary distinction between viruses and worms?

Page 5: quiz crime.docx

A)Worms do not rely on a host program to infect.

B)Worms masquerade as legitimate while causing damage.

C)Viruses do not rely on a host program to infect.

D)A computer virus is active without a host.

Malware is simply a nuisance and does not pose substantial risk to large organisations.A.TrueB. False

Cyber ethics and cyber laws are being formulated to put a stop to cyber crimes? A. True B. False

If you use a public Wi-Fi network (in a café or hotel, for example) that assigns you a password, it’s okay to send confidential business data.a.Trueb.

Page 6: quiz crime.docx

False

Is email software with built-in spam filtering a way to protect yourself from email spam? A. Yes(Missed) B. No

25 Which of the following techniques do not help prevent computer crime?

A)Authentication

B)Digital forensic analysis

C)Firewalls

D)Encryption

Computer hacking is the practice of modifying computer software and hardware to accomplish a goal outside of the creator's original purpose. A. Yes B. No

You should NOT respond to Spam mail because it puts you at greater risk of receiving more spam mail. A. True B. False

Page 7: quiz crime.docx

Email Spoofing

Changing the email header so it looks like it’s coming from someone else. This is also used to try to trick people into giving out personal information.

Phishing

A scam where an official-looking email is sent to an unsuspecting user to try to trick them out of their username, password or other information.  They are usually directed to click onto a link that goes to a fake (spoofed) version of a real organization’s website.

Pagejacking

A fake version of a real organizations website. The address bar can be altered so it appears to be the official website.

Vishing

Short for “voice phishing” and is the latest scam. Starts with an email or phone call asking you to verify the last three digits of your credit card number to verify who you are.

Page 8: quiz crime.docx

Keystroke Phishing

When a Trojan program is unknowingly downloaded onto your computer that tracks the keystrokes you enter into the computer and sends it back to the schemer, who hopes to get a username and password from it.

Identity Theft

A person gathers your personal information and poses as you to get credit, merchandise, services or to commit other crimes.

Spear Phishing

Personalized Phishing

Cookie Poisoning

The modification of cookies that are put on your computer by an attacker to gain information about a user.

Spyware

Software that is downloaded onto a user’s computer without his knowledge and used for malevolent purposes.

Page 9: quiz crime.docx

Cyberstalking A crime where the attacker harasses the victim using electronic communication such as email, IM’s, chat rooms, discussion groups, etc.

Wardriving

The practice of driving around in a vehicle with a Wi-Fi enabled laptop looking for available signals to use.

Malware

The malicious software that is developed for the purpose of doing harm.