WEEK 4-5 SP101

WEEK 4-5 SP101

University

25 Qs

quiz-placeholder

Similar activities

Python GUI

Python GUI

University

20 Qs

SE LIGA I - 2DS - ANÁLISE E PROJETO DE SISTEMAS

SE LIGA I - 2DS - ANÁLISE E PROJETO DE SISTEMAS

2nd Grade - University

20 Qs

P J Quang Huy

P J Quang Huy

7th Grade - University

20 Qs

ÔN TẬP CRV1

ÔN TẬP CRV1

6th Grade - University

22 Qs

Activity - Task Completion and Safety

Activity - Task Completion and Safety

9th Grade - University

20 Qs

Algoritma Struktur Data

Algoritma Struktur Data

University

20 Qs

Preguntas sobre Tierras Raras

Preguntas sobre Tierras Raras

11th Grade - University

20 Qs

QUIZ#1 MIL GALILEE

QUIZ#1 MIL GALILEE

12th Grade - University

20 Qs

WEEK 4-5 SP101

WEEK 4-5 SP101

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Joel Almazan

Used 2+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

1. What is the primary goal of computer crime?




A. To improve software efficiency

B. To promote online education

C. To conduct illegal activities using computers or networks

D. To increase system performance

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

2. Which of the following is an example of phishing?




A. Infecting a computer with malware

B. Sending deceptive emails to obtain personal information

C. Physically stealing a laptop

D. Encrypting files for data protection

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

3. A Denial of Service (DoS) attack aims to:



A. Provide unlimited internet access

B. Overload systems to make them unavailable

D. Restore backup data

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

4. What type of cybercrime involves stealing someone’s personal data to commit fraud?



A. Cyber terrorism

B. Cyber espionage

C. Identity theft

D. Intellectual property theft

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

5. Cyber fraud involves:



A. Ethical hacking activities

B. Illegal access to government records

C. Manipulating systems to gain money or property

D. Disabling anti-virus software

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

6. The illegal act of intercepting data from individuals or companies is called:



A. Cyber terrorism

B. Cyber fraud

C. Cyber espionage

D. Script kiddie attack

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

7. Which of the following is considered cyber terrorism?


A. Using encryption to secure messages

B. Spreading malware for fun

C. Hacking government databases to cause panic

D. Testing software vulnerabilities with permission

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?