Computer and Internet Crimes Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What are the two categories into which computer crime can be separated?

  • Crimes facilitated by a computer and crimes where the computer is the target (correct)
  • Software-related crimes and hardware-related crimes
  • Malware-based crimes and phishing-based crimes
  • Online crimes and offline crimes

Which of the following is NOT an overlapping type of computer security risk?

  • Bugs or misconfiguration problems that allow unauthorized remote users to access the system
  • Interception of network data sent from browser to server or vice versa via network eavesdropping
  • Unauthorized access to sensitive data through social engineering (correct)
  • Browser-side risks

What is the first and perhaps the easier rule of computer security mentioned in the text?

  • Encryption of Data
  • Regular Software Updates
  • Firewall Protection
  • Physical Security (correct)

What type of computer security risk involves hackers exploiting holes in operating systems of local and remote systems?

<p>Hacking (C)</p> Signup and view all the answers

What type of malicious software can start working on a computer once it has been used?

<p>Viruses (C)</p> Signup and view all the answers

What is the term for computer crimes where the computer is the target?

<p>Crimes where the computer is the target (B)</p> Signup and view all the answers

What is the primary focus of physical security in computer security?

<p>Safeguarding computer hardware and facilities (D)</p> Signup and view all the answers

What type of computer security risk involves unauthorized remote users exploiting bugs or misconfigurations?

<p>Bugs or misconfiguration problems (B)</p> Signup and view all the answers

What is the term for the type of malicious software that affects a computer system while it is connected to the internet?

<p>Malicious logic (B)</p> Signup and view all the answers

What do hackers exploit when they find ways to access local and remote systems?

<p>Holes in operating systems (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Cyber Security and Cyber Crime Quiz
10 questions
Cyber Crime and Hacking
12 questions
Cyber Crime Introduction and Impact
41 questions
Use Quizgecko on...
Browser
Browser