
2 Understanding Cybercrime and Cybersecurity
Authored by Rabiul Hasan
Other
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
26 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which cyber threat actor is most likely to attack for financial gain?
Cyber terrorists
Hacktivists
Organised cybercriminals
Insider threats
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is an insider threat?
A hacker outside an organization
An employee or trusted person who misuses access
A government agency monitoring cyber activity
A business that reports cybercrimes
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What do hacktivists typically aim to achieve?
Financial gain
Political or social change
Destroy government databases
Create secure business networks
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is NOT an example of a cyber threat actor?
Cybercriminals
Hacktivists
Social media users
State-sponsored attackers
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is considered a critical national infrastructure (CNI) target?
Social media accounts
Power grids and water supplies
Online gaming platforms
E-commerce websites
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which type of cyberattack is most likely to target consumers?
DDoS attack
Phishing scams
SQL injection
Man-in-the-middle attacks
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Why do businesses rely on cybersecurity?
To protect customer data and prevent financial losses
To increase the speed of email communications
To develop software faster
To eliminate the need for employees
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?