WEEK 4-5 SP101

WEEK 4-5 SP101

University

25 Qs

quiz-placeholder

Similar activities

001

001

University

20 Qs

Penjaminan Kualitas Sistem Informasi

Penjaminan Kualitas Sistem Informasi

University

20 Qs

Cyber Security Quiz1

Cyber Security Quiz1

University

20 Qs

Ôn tập tin 7 giữa kì 1

Ôn tập tin 7 giữa kì 1

7th Grade - University

29 Qs

Algoritma Struktur Data

Algoritma Struktur Data

University

20 Qs

soal uh 9

soal uh 9

9th Grade - University

25 Qs

Information Technology Quiz

Information Technology Quiz

University

20 Qs

Web_FE_BASIC_SS16

Web_FE_BASIC_SS16

University

20 Qs

WEEK 4-5 SP101

WEEK 4-5 SP101

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Joel Almazan

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

1. What is the primary goal of computer crime?




A. To improve software efficiency

B. To promote online education

C. To conduct illegal activities using computers or networks

D. To increase system performance

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

2. Which of the following is an example of phishing?




A. Infecting a computer with malware

B. Sending deceptive emails to obtain personal information

C. Physically stealing a laptop

D. Encrypting files for data protection

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

3. A Denial of Service (DoS) attack aims to:



A. Provide unlimited internet access

B. Overload systems to make them unavailable

D. Restore backup data

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

4. What type of cybercrime involves stealing someone’s personal data to commit fraud?



A. Cyber terrorism

B. Cyber espionage

C. Identity theft

D. Intellectual property theft

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

5. Cyber fraud involves:



A. Ethical hacking activities

B. Illegal access to government records

C. Manipulating systems to gain money or property

D. Disabling anti-virus software

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

6. The illegal act of intercepting data from individuals or companies is called:



A. Cyber terrorism

B. Cyber fraud

C. Cyber espionage

D. Script kiddie attack

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

7. Which of the following is considered cyber terrorism?


A. Using encryption to secure messages

B. Spreading malware for fun

C. Hacking government databases to cause panic

D. Testing software vulnerabilities with permission

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?