Computer and Internet Crimes Quiz
10 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What are the two categories into which computer crime can be separated?

  • Crimes facilitated by a computer and crimes where the computer is the target (correct)
  • Software-related crimes and hardware-related crimes
  • Malware-based crimes and phishing-based crimes
  • Online crimes and offline crimes

Which of the following is NOT an overlapping type of computer security risk?

  • Bugs or misconfiguration problems that allow unauthorized remote users to access the system
  • Interception of network data sent from browser to server or vice versa via network eavesdropping
  • Unauthorized access to sensitive data through social engineering (correct)
  • Browser-side risks

What is the first and perhaps the easier rule of computer security mentioned in the text?

  • Encryption of Data
  • Regular Software Updates
  • Firewall Protection
  • Physical Security (correct)

What type of computer security risk involves hackers exploiting holes in operating systems of local and remote systems?

<p>Hacking (C)</p> Signup and view all the answers

What type of malicious software can start working on a computer once it has been used?

<p>Viruses (C)</p> Signup and view all the answers

What is the term for computer crimes where the computer is the target?

<p>Crimes where the computer is the target (B)</p> Signup and view all the answers

What is the primary focus of physical security in computer security?

<p>Safeguarding computer hardware and facilities (D)</p> Signup and view all the answers

What type of computer security risk involves unauthorized remote users exploiting bugs or misconfigurations?

<p>Bugs or misconfiguration problems (B)</p> Signup and view all the answers

What is the term for the type of malicious software that affects a computer system while it is connected to the internet?

<p>Malicious logic (B)</p> Signup and view all the answers

What do hackers exploit when they find ways to access local and remote systems?

<p>Holes in operating systems (B)</p> Signup and view all the answers

More Like This

Cyber Security and Cyber Crime Quiz
10 questions
Cyber Crime Introduction and Impact
41 questions
Use Quizgecko on...
Browser
Browser