Cybercrime Lecture 2: The Growth of Cybercrime
78 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the main purpose of adware?

  • To generate online advertisements for revenue (correct)
  • To steal sensitive information
  • To replicate itself on other computers
  • To block access to the user's data
  • How are ransomware ransoms often paid?

  • Bitcoin (correct)
  • Cash
  • Credit card
  • PayPal
  • What is a key characteristic of computer worms?

  • They replicate themselves by modifying other computer programs
  • They rely on security failures to spread (correct)
  • They generate online advertisements
  • They threaten to publish victim's data
  • Which type of malware records the keys struck on a keyboard?

    <p>Keystroke Logging (D)</p> Signup and view all the answers

    What does a trojan horse do?

    <p>Misleads users of its true intent (D)</p> Signup and view all the answers

    What is the primary function of a computer virus?

    <p>Replicate itself by modifying other computer programs (B)</p> Signup and view all the answers

    Can malware harm computer hardware?

    <p>Yes, it can permanently damage hardware components (A)</p> Signup and view all the answers

    What type of money is Bitcoin?

    <p><em>Virtual currency</em> (D)</p> Signup and view all the answers

    Which type of cybercriminals are highly technically skilled and use advanced techniques?

    <p>Organized cybercriminals (B)</p> Signup and view all the answers

    What is the primary reason for the growing vulnerability of businesses to cyber thieves?

    <p>Increased reliance on networks and internet connectivity (B)</p> Signup and view all the answers

    In 2019, how much did companies lose to cybercrime?

    <p>$1.8 billion (C)</p> Signup and view all the answers

    What is the general term for malicious software, including viruses that may be installed or executed without your knowledge?

    <p>Malware (A)</p> Signup and view all the answers

    What does spyware aim to do?

    <p>Gather information without the user's knowledge (B)</p> Signup and view all the answers

    Which type of cybercrime involves gathering information about a person or organization without their knowledge?

    <p>Spyware (C)</p> Signup and view all the answers

    What is the primary purpose of social engineering in the context of cybercrime?

    <p>Manipulating individuals to divulge confidential information (C)</p> Signup and view all the answers

    What is the main risk associated with prohibited/illegal content in the context of cybercrime?

    <p>Legal implications and consequences (B)</p> Signup and view all the answers

    What is the term for leaving a USB containing spyware on someone's desk?

    <p>Baiting (B)</p> Signup and view all the answers

    Which type of social engineering attack involves the use of shortened or misleading links to redirect users to suspicious websites?

    <p>Phishing (A)</p> Signup and view all the answers

    What is the term for urgent voice mails used to convince victims to act quickly or ask for help?

    <p>Vishing (C)</p> Signup and view all the answers

    Which social engineering technique involves creating a fabricated scenario to steal victims' personal information?

    <p>Pretexting (A)</p> Signup and view all the answers

    What is the term for the forging of someone's identity for the purpose of fraud?

    <p>Identity Theft (D)</p> Signup and view all the answers

    Which social engineering technique involves offering something enticing in exchange for login information or private data?

    <p>Baiting (C)</p> Signup and view all the answers

    What is the term for voice phishing?

    <p>Vishing (D)</p> Signup and view all the answers

    Which type of social engineering attack focuses on creating a good pretext or a fabricated scenario?

    <p>Pretexting (A)</p> Signup and view all the answers

    What is the term used for misleading users with suspicious websites hosting phishing landing pages?

    <p>Phishing (D)</p> Signup and view all the answers

    Which social engineering technique involves urgently convincing victims to act quickly or ask for help?

    <p>Vishing (B)</p> Signup and view all the answers

    What is the primary focus of pretexting in social engineering?

    <p>Fabricating scenarios to steal victims' personal information (A)</p> Signup and view all the answers

    Which social engineering technique typically uses urgent voice mails to convince victims to act quickly or ask for help?

    <p>Vishing (voice phishing) (C)</p> Signup and view all the answers

    What is the main aim of baiting in the context of social engineering?

    <p>To offer something enticing in exchange for private data (C)</p> Signup and view all the answers

    Which type of malware is likely to be installed on a computer through leaving a USB containing spyware on someone's desk?

    <p>Spyware (D)</p> Signup and view all the answers

    What is the primary intention behind using shortened or misleading links in phishing attacks?

    <p>Redirecting users to suspicious websites hosting phishing landing pages (D)</p> Signup and view all the answers

    What is the main goal of vishing as a social engineering technique?

    <p>To urgently convince victims to act quickly or ask for help (A)</p> Signup and view all the answers

    What does phishing primarily aim to achieve?

    <p>Redirecting users to suspicious websites hosting phishing landing pages (D)</p> Signup and view all the answers

    In social engineering, what is the key purpose of using spyware?

    <p>Gathering information about a person or organization without their knowledge (B)</p> Signup and view all the answers

    What is the recommended way to verify the sender of an email?

    <p>Check the 'From' field for any signs of tampering (C)</p> Signup and view all the answers

    Which type of software detects and removes or quarantines computer viruses?

    <p>Anti-virus software (B)</p> Signup and view all the answers

    What is a characteristic of a strong password?

    <p>Containing uppercase, lowercase, numbers, and special characters (C)</p> Signup and view all the answers

    What is the main function of a firewall in computer and network safety?

    <p>Monitoring outgoing and incoming traffic (C)</p> Signup and view all the answers

    Which measure should be taken to ensure email safety?

    <p>Having backups for important emails (C)</p> Signup and view all the answers

    What is the recommended method for verifying credentials, such as in bank applications?

    <p>Two-factor authentication (A)</p> Signup and view all the answers

    What is an important practice to follow regarding safe browsing?

    <p>Using only trusted open-source applications (D)</p> Signup and view all the answers

    What is the primary reason for regularly updating the operating system and software?

    <p>To address security vulnerabilities and enhance protection (A)</p> Signup and view all the answers

    What should be avoided while handling unknown email attachments?

    <p>Opening unknown attachments (D)</p> Signup and view all the answers

    How can one prevent unauthorized access to important emails?

    <p>Always logging out after accessing emails (D)</p> Signup and view all the answers

    What is the primary characteristic of a computer worm?

    <p>It replicates itself in order to spread to other computers (D)</p> Signup and view all the answers

    Which type of malicious software threatens to publish the victim's data or block access to it unless a ransom is paid?

    <p>Ransomware (C)</p> Signup and view all the answers

    What is the term for the action of recording the keys struck on a keyboard, without the person using the keyboard being aware?

    <p>Keystroke logging (C)</p> Signup and view all the answers

    What is the primary method through which ransomware ransoms are often paid?

    <p>Bitcoin (D)</p> Signup and view all the answers

    What is the primary function of adware?

    <p>Generating revenue for its developer by automatically generating online advertisements (D)</p> Signup and view all the answers

    Which type of malicious computer program misleads users of its true intent?

    <p>Trojan horse (D)</p> Signup and view all the answers

    Can malware harm computer hardware?

    <p>Yes, malware can physically damage computer hardware (D)</p> Signup and view all the answers

    What is Bitcoin primarily used for in the context of cybercrime?

    <p>Receiving ransom payments with a high degree of anonymity (B)</p> Signup and view all the answers

    What is the primary purpose of CovidLock malware?

    <p>To encrypt data from Android devices and demand a ransom (C)</p> Signup and view all the answers

    Which social engineering technique involves urgently convincing victims to act quickly or ask for help?

    <p>Vishing (B)</p> Signup and view all the answers

    What is the primary intention of using ILOVEYOU virus?

    <p>To send a bogus 'love letter' and steal passwords (D)</p> Signup and view all the answers

    How does social engineering primarily manipulate the user to provide confidential data?

    <p>By tricking the user into urgent actions or seeking help (B)</p> Signup and view all the answers

    What is the main function of CovidLock malware?

    <p>To encrypt data from Android devices and deny access (A)</p> Signup and view all the answers

    What is the main aim of CovidLock malware?

    <p>To encrypt data from Android devices and demand a ransom (C)</p> Signup and view all the answers

    Which type of virus threatens to publish the victim's data or block access to it unless a ransom is paid?

    <p>WannaCry (A)</p> Signup and view all the answers

    What is the primary function of ILOVEYOU virus?

    <p>To send a bogus 'love letter' and steal passwords (D)</p> Signup and view all the answers

    What is the primary characteristic of cyber stalking?

    <p>Using the Internet or other electronic means to stalk or harass individuals or organizations (B)</p> Signup and view all the answers

    What is the primary purpose of pharming in cybercrime?

    <p>Creating a fake website and then redirecting users to it (B)</p> Signup and view all the answers

    What is the main focus of prohibited/illegal content in the context of cybercrime?

    <p>Including materials which encourage violence, criminal behavior, or fraudulent acts (D)</p> Signup and view all the answers

    What is the primary function of baiting in the context of social engineering?

    <p>Leaving a USB with an interesting label on a desk (A)</p> Signup and view all the answers

    What is the primary characteristic of spamming in the context of cybercrime?

    <p>Sending unsolicited and unwanted junk email in bulk (C)</p> Signup and view all the answers

    What is the main goal of cyber criminals engaging in baiting as a social engineering technique?

    <p>To entice individuals into picking up physical items like USB drives with interesting labels (A)</p> Signup and view all the answers

    What is the primary intention behind prohibited/illegal content in the context of cybercrime?

    <p>Encouraging violence, criminal behavior, or dangerous behavior (B)</p> Signup and view all the answers

    Which action best describes pharming in the context of cybercrime?

    <p>Producing a fake website and then redirecting users to it (C)</p> Signup and view all the answers

    What is the primary purpose of using two-factor authentication?

    <p>To provide multiple layers of security by requiring two different methods to verify the user's identity. (C)</p> Signup and view all the answers

    What measure should be taken to ensure email safety according to the text?

    <p>Use strong passwords and change them periodically. (D)</p> Signup and view all the answers

    What is the main function of a firewall in computer and network safety?

    <p>To protect a computer or network by monitoring all outgoing and incoming traffic. (A)</p> Signup and view all the answers

    What is the primary characteristic of a computer worm according to the text?

    <p>It can replicate itself and spread to other computers without any human intervention. (C)</p> Signup and view all the answers

    What is a characteristic of a strong password based on the text?

    <p>Containing uppercase, lowercase, numbers, and special characters. (D)</p> Signup and view all the answers

    What is the primary risk associated with prohibited/illegal content in the context of cybercrime?

    <p>It can be used to deceive and defraud individuals or organizations. (A)</p> Signup and view all the answers

    What does spyware primarily aim to do according to the text?

    <p>To gather information about a person or organization without their knowledge. (B)</p> Signup and view all the answers

    What is Bitcoin primarily used for in the context of cybercrime based on the text?

    <p>Ransom payments for cyberattacks such as ransomware. (C)</p> Signup and view all the answers

    What is the recommended practice regarding safe browsing according to the text?

    <p>Avoid visiting untrusted or suspicious websites. (B)</p> Signup and view all the answers

    Which type of software detects and removes or quarantines computer viruses?

    <p>Anti-virus Software (B)</p> Signup and view all the answers

    More Like This

    Cybercrime and Internet Security Quiz
    10 questions
    Types of Cybercrime Quiz
    5 questions
    Cybercrime Statistics Quiz
    40 questions

    Cybercrime Statistics Quiz

    GraciousSpatialism8152 avatar
    GraciousSpatialism8152
    Use Quizgecko on...
    Browser
    Browser