Vous êtes sur la page 1sur 9

1. Cybercrime is basically criminal activity done by using computers and the internet.

A. True
B. False
3. Spam floods the internet and leaves people with no option other than to recieve it.
A. True
B. False
4. The act of stalking an individual through a group or electronic means is called cyberstalking.
A. True
B. False
6. Your social security number should not be kept private?
A. True
B. False
7. Identity Theft is a type of crime in which personal information is stolen to commit fraudulent
activity.
A. True
B. False
8. Social networking sites have nothing to do with the percentage of missing kids annually.
A. True
B. False











































7

What is a Hacktivist?

A)

Politically motivated hacker


B)
Denial of service attacker


C)

A proponent of Napster

D)

A person engaging in an intentional act involving a computer in which the
person may have gained at the victims expense









































































19

What is the primary distinction between viruses and worms?

A)

Worms do not rely on a host program to infect.

B)

Worms masquerade as legitimate while causing damage.

C)

Viruses do not rely on a host program to infect.

D)

A computer virus is active without a host.



















Malware is simply a nuisance and does not pose substantial risk to large
organisations.
A.True
B. False

Cyber ethics and cyber laws are being formulated to put a stop to cyber crimes?
A. True
B. False


If you use a public Wi-Fi network (in a caf or hotel,
for example) that assigns you a password, its okay to
send confidential business data.
a.
True
b.
False





Is email software with built-in spam filtering a way to protect yourself from
email spam?
A. Yes(Missed)
B. No











25

Which of the following techniques do not help prevent computer crime?

A)

Authentication

B)

Digital forensic analysis

C)

Firewalls

D)

Encryption

Computer hacking is the practice of modifying computer software and hardware to accomplish a
goal outside of the creator's original purpose.
A. Yes
B. No

You should NOT respond to Spam mail because it puts you at greater risk of receiving more
spam mail.
A. True
B. False



Email Spoofing
Changing the email header so
it looks like its coming from
someone else. This is also
used to try to trick people into
giving out personal
information.


Phishing
A scam where an official-
looking email is sent to an
unsuspecting user to try to

trick them out of their
username, password or other
information. They are
usually directed to click onto
a link that goes to a fake
(spoofed) version of a real
organizations website.

Pagejacking
A fake version of a real
organizations website. The
address bar can be altered so
it appears to be the official
website.


Vishing
Short for voice phishing
and is the latest scam. Starts
with an email or phone call
asking you to verify the last
three digits of your credit
card number to verify who
you are.


Keystroke Phishing

When a Trojan program is
unknowingly downloaded
onto your computer that
tracks the keystrokes you
enter into the computer and
sends it back to the schemer,
who hopes to get a username
and password from it.


Identity Theft
A person gathers your

personal information and
poses as you to get credit,
merchandise, services or to
commit other crimes.

Spear Phishing
Personalized Phishing


Cookie Poisoning
The modification of cookies
that are put on your computer
by an attacker to gain
information about a user.


Spyware
Software that is downloaded
onto a users computer
without his knowledge and
used for malevolent purposes.


Cyberstalking A crime where
the attacker harasses the
victim using electronic
communication such as
email, IMs, chat rooms,
discussion groups, etc.


Wardriving

The practice of driving
around in a vehicle with a
Wi-Fi enabled laptop looking
for available signals to use.


Malware

The malicious software that is
developed for the purpose of
doing harm.

Vous aimerez peut-être aussi