Computer and Internet Crimes Quiz
10 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What are the two categories into which computer crime can be separated?

  • Crimes facilitated by a computer and crimes where the computer is the target (correct)
  • Software-related crimes and hardware-related crimes
  • Malware-based crimes and phishing-based crimes
  • Online crimes and offline crimes
  • Which of the following is NOT an overlapping type of computer security risk?

  • Bugs or misconfiguration problems that allow unauthorized remote users to access the system
  • Interception of network data sent from browser to server or vice versa via network eavesdropping
  • Unauthorized access to sensitive data through social engineering (correct)
  • Browser-side risks
  • What is the first and perhaps the easier rule of computer security mentioned in the text?

  • Encryption of Data
  • Regular Software Updates
  • Firewall Protection
  • Physical Security (correct)
  • What type of computer security risk involves hackers exploiting holes in operating systems of local and remote systems?

    <p>Hacking</p> Signup and view all the answers

    What type of malicious software can start working on a computer once it has been used?

    <p>Viruses</p> Signup and view all the answers

    What is the term for computer crimes where the computer is the target?

    <p>Crimes where the computer is the target</p> Signup and view all the answers

    What is the primary focus of physical security in computer security?

    <p>Safeguarding computer hardware and facilities</p> Signup and view all the answers

    What type of computer security risk involves unauthorized remote users exploiting bugs or misconfigurations?

    <p>Bugs or misconfiguration problems</p> Signup and view all the answers

    What is the term for the type of malicious software that affects a computer system while it is connected to the internet?

    <p>Malicious logic</p> Signup and view all the answers

    What do hackers exploit when they find ways to access local and remote systems?

    <p>Holes in operating systems</p> Signup and view all the answers

    More Like This

    Cyber Security and Cyber Crime Quiz
    10 questions
    Online Crime and Cybersecurity
    10 questions
    Cyber Crime and Hacking
    12 questions
    Cyber Crime Introduction and Impact
    41 questions
    Use Quizgecko on...
    Browser
    Browser