Cybercrime Lecture 2: The Growth of Cybercrime
78 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the main purpose of adware?

  • To generate online advertisements for revenue (correct)
  • To steal sensitive information
  • To replicate itself on other computers
  • To block access to the user's data
  • How are ransomware ransoms often paid?

  • Bitcoin (correct)
  • Cash
  • Credit card
  • PayPal
  • What is a key characteristic of computer worms?

  • They replicate themselves by modifying other computer programs
  • They rely on security failures to spread (correct)
  • They generate online advertisements
  • They threaten to publish victim's data
  • Which type of malware records the keys struck on a keyboard?

    <p>Keystroke Logging</p> Signup and view all the answers

    What does a trojan horse do?

    <p>Misleads users of its true intent</p> Signup and view all the answers

    What is the primary function of a computer virus?

    <p>Replicate itself by modifying other computer programs</p> Signup and view all the answers

    Can malware harm computer hardware?

    <p>Yes, it can permanently damage hardware components</p> Signup and view all the answers

    What type of money is Bitcoin?

    <p><em>Virtual currency</em></p> Signup and view all the answers

    Which type of cybercriminals are highly technically skilled and use advanced techniques?

    <p>Organized cybercriminals</p> Signup and view all the answers

    What is the primary reason for the growing vulnerability of businesses to cyber thieves?

    <p>Increased reliance on networks and internet connectivity</p> Signup and view all the answers

    In 2019, how much did companies lose to cybercrime?

    <p>$1.8 billion</p> Signup and view all the answers

    What is the general term for malicious software, including viruses that may be installed or executed without your knowledge?

    <p>Malware</p> Signup and view all the answers

    What does spyware aim to do?

    <p>Gather information without the user's knowledge</p> Signup and view all the answers

    Which type of cybercrime involves gathering information about a person or organization without their knowledge?

    <p>Spyware</p> Signup and view all the answers

    What is the primary purpose of social engineering in the context of cybercrime?

    <p>Manipulating individuals to divulge confidential information</p> Signup and view all the answers

    What is the main risk associated with prohibited/illegal content in the context of cybercrime?

    <p>Legal implications and consequences</p> Signup and view all the answers

    What is the term for leaving a USB containing spyware on someone's desk?

    <p>Baiting</p> Signup and view all the answers

    Which type of social engineering attack involves the use of shortened or misleading links to redirect users to suspicious websites?

    <p>Phishing</p> Signup and view all the answers

    What is the term for urgent voice mails used to convince victims to act quickly or ask for help?

    <p>Vishing</p> Signup and view all the answers

    Which social engineering technique involves creating a fabricated scenario to steal victims' personal information?

    <p>Pretexting</p> Signup and view all the answers

    What is the term for the forging of someone's identity for the purpose of fraud?

    <p>Identity Theft</p> Signup and view all the answers

    Which social engineering technique involves offering something enticing in exchange for login information or private data?

    <p>Baiting</p> Signup and view all the answers

    What is the term for voice phishing?

    <p>Vishing</p> Signup and view all the answers

    Which type of social engineering attack focuses on creating a good pretext or a fabricated scenario?

    <p>Pretexting</p> Signup and view all the answers

    What is the term used for misleading users with suspicious websites hosting phishing landing pages?

    <p>Phishing</p> Signup and view all the answers

    Which social engineering technique involves urgently convincing victims to act quickly or ask for help?

    <p>Vishing</p> Signup and view all the answers

    What is the primary focus of pretexting in social engineering?

    <p>Fabricating scenarios to steal victims' personal information</p> Signup and view all the answers

    Which social engineering technique typically uses urgent voice mails to convince victims to act quickly or ask for help?

    <p>Vishing (voice phishing)</p> Signup and view all the answers

    What is the main aim of baiting in the context of social engineering?

    <p>To offer something enticing in exchange for private data</p> Signup and view all the answers

    Which type of malware is likely to be installed on a computer through leaving a USB containing spyware on someone's desk?

    <p>Spyware</p> Signup and view all the answers

    What is the primary intention behind using shortened or misleading links in phishing attacks?

    <p>Redirecting users to suspicious websites hosting phishing landing pages</p> Signup and view all the answers

    What is the main goal of vishing as a social engineering technique?

    <p>To urgently convince victims to act quickly or ask for help</p> Signup and view all the answers

    What does phishing primarily aim to achieve?

    <p>Redirecting users to suspicious websites hosting phishing landing pages</p> Signup and view all the answers

    In social engineering, what is the key purpose of using spyware?

    <p>Gathering information about a person or organization without their knowledge</p> Signup and view all the answers

    What is the recommended way to verify the sender of an email?

    <p>Check the 'From' field for any signs of tampering</p> Signup and view all the answers

    Which type of software detects and removes or quarantines computer viruses?

    <p>Anti-virus software</p> Signup and view all the answers

    What is a characteristic of a strong password?

    <p>Containing uppercase, lowercase, numbers, and special characters</p> Signup and view all the answers

    What is the main function of a firewall in computer and network safety?

    <p>Monitoring outgoing and incoming traffic</p> Signup and view all the answers

    Which measure should be taken to ensure email safety?

    <p>Having backups for important emails</p> Signup and view all the answers

    What is the recommended method for verifying credentials, such as in bank applications?

    <p>Two-factor authentication</p> Signup and view all the answers

    What is an important practice to follow regarding safe browsing?

    <p>Using only trusted open-source applications</p> Signup and view all the answers

    What is the primary reason for regularly updating the operating system and software?

    <p>To address security vulnerabilities and enhance protection</p> Signup and view all the answers

    What should be avoided while handling unknown email attachments?

    <p>Opening unknown attachments</p> Signup and view all the answers

    How can one prevent unauthorized access to important emails?

    <p>Always logging out after accessing emails</p> Signup and view all the answers

    What is the primary characteristic of a computer worm?

    <p>It replicates itself in order to spread to other computers</p> Signup and view all the answers

    Which type of malicious software threatens to publish the victim's data or block access to it unless a ransom is paid?

    <p>Ransomware</p> Signup and view all the answers

    What is the term for the action of recording the keys struck on a keyboard, without the person using the keyboard being aware?

    <p>Keystroke logging</p> Signup and view all the answers

    What is the primary method through which ransomware ransoms are often paid?

    <p>Bitcoin</p> Signup and view all the answers

    What is the primary function of adware?

    <p>Generating revenue for its developer by automatically generating online advertisements</p> Signup and view all the answers

    Which type of malicious computer program misleads users of its true intent?

    <p>Trojan horse</p> Signup and view all the answers

    Can malware harm computer hardware?

    <p>Yes, malware can physically damage computer hardware</p> Signup and view all the answers

    What is Bitcoin primarily used for in the context of cybercrime?

    <p>Receiving ransom payments with a high degree of anonymity</p> Signup and view all the answers

    What is the primary purpose of CovidLock malware?

    <p>To encrypt data from Android devices and demand a ransom</p> Signup and view all the answers

    Which social engineering technique involves urgently convincing victims to act quickly or ask for help?

    <p>Vishing</p> Signup and view all the answers

    What is the primary intention of using ILOVEYOU virus?

    <p>To send a bogus 'love letter' and steal passwords</p> Signup and view all the answers

    How does social engineering primarily manipulate the user to provide confidential data?

    <p>By tricking the user into urgent actions or seeking help</p> Signup and view all the answers

    What is the main function of CovidLock malware?

    <p>To encrypt data from Android devices and deny access</p> Signup and view all the answers

    What is the main aim of CovidLock malware?

    <p>To encrypt data from Android devices and demand a ransom</p> Signup and view all the answers

    Which type of virus threatens to publish the victim's data or block access to it unless a ransom is paid?

    <p>WannaCry</p> Signup and view all the answers

    What is the primary function of ILOVEYOU virus?

    <p>To send a bogus 'love letter' and steal passwords</p> Signup and view all the answers

    What is the primary characteristic of cyber stalking?

    <p>Using the Internet or other electronic means to stalk or harass individuals or organizations</p> Signup and view all the answers

    What is the primary purpose of pharming in cybercrime?

    <p>Creating a fake website and then redirecting users to it</p> Signup and view all the answers

    What is the main focus of prohibited/illegal content in the context of cybercrime?

    <p>Including materials which encourage violence, criminal behavior, or fraudulent acts</p> Signup and view all the answers

    What is the primary function of baiting in the context of social engineering?

    <p>Leaving a USB with an interesting label on a desk</p> Signup and view all the answers

    What is the primary characteristic of spamming in the context of cybercrime?

    <p>Sending unsolicited and unwanted junk email in bulk</p> Signup and view all the answers

    What is the main goal of cyber criminals engaging in baiting as a social engineering technique?

    <p>To entice individuals into picking up physical items like USB drives with interesting labels</p> Signup and view all the answers

    What is the primary intention behind prohibited/illegal content in the context of cybercrime?

    <p>Encouraging violence, criminal behavior, or dangerous behavior</p> Signup and view all the answers

    Which action best describes pharming in the context of cybercrime?

    <p>Producing a fake website and then redirecting users to it</p> Signup and view all the answers

    What is the primary purpose of using two-factor authentication?

    <p>To provide multiple layers of security by requiring two different methods to verify the user's identity.</p> Signup and view all the answers

    What measure should be taken to ensure email safety according to the text?

    <p>Use strong passwords and change them periodically.</p> Signup and view all the answers

    What is the main function of a firewall in computer and network safety?

    <p>To protect a computer or network by monitoring all outgoing and incoming traffic.</p> Signup and view all the answers

    What is the primary characteristic of a computer worm according to the text?

    <p>It can replicate itself and spread to other computers without any human intervention.</p> Signup and view all the answers

    What is a characteristic of a strong password based on the text?

    <p>Containing uppercase, lowercase, numbers, and special characters.</p> Signup and view all the answers

    What is the primary risk associated with prohibited/illegal content in the context of cybercrime?

    <p>It can be used to deceive and defraud individuals or organizations.</p> Signup and view all the answers

    What does spyware primarily aim to do according to the text?

    <p>To gather information about a person or organization without their knowledge.</p> Signup and view all the answers

    What is Bitcoin primarily used for in the context of cybercrime based on the text?

    <p>Ransom payments for cyberattacks such as ransomware.</p> Signup and view all the answers

    What is the recommended practice regarding safe browsing according to the text?

    <p>Avoid visiting untrusted or suspicious websites.</p> Signup and view all the answers

    Which type of software detects and removes or quarantines computer viruses?

    <p>Anti-virus Software</p> Signup and view all the answers

    More Like This

    Types of Cybercrime Quiz
    5 questions
    Introduction to Cybercrime
    24 questions

    Introduction to Cybercrime

    IntuitiveAmazonite avatar
    IntuitiveAmazonite
    Cybercrime Statistics Quiz
    40 questions

    Cybercrime Statistics Quiz

    GraciousSpatialism8152 avatar
    GraciousSpatialism8152
    Use Quizgecko on...
    Browser
    Browser