Cybercrime and Computer Laws Review Exam

Cybercrime and Computer Laws Review Exam

University

81 Qs

quiz-placeholder

Similar activities

Latihan Soal SAT Sosiologi Semester Genap

Latihan Soal SAT Sosiologi Semester Genap

11th Grade - University

80 Qs

Early Medieval Europe

Early Medieval Europe

7th Grade - University

80 Qs

Desenvolupament Sensorial en la Infància

Desenvolupament Sensorial en la Infància

1st Grade - University

80 Qs

Holocaust

Holocaust

9th Grade - University

86 Qs

Humanistic - Existential

Humanistic - Existential

University

85 Qs

History Quiz for Leibner

History Quiz for Leibner

University

80 Qs

AP Micro Economics Unit 3

AP Micro Economics Unit 3

10th Grade - University

77 Qs

Unit 2: American Revolution

Unit 2: American Revolution

8th Grade - University

81 Qs

Cybercrime and Computer Laws Review Exam

Cybercrime and Computer Laws Review Exam

Assessment

Quiz

Social Studies

University

Practice Problem

Medium

Created by

El Señor

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

81 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the use of a computer as an instrument to further illegal ends?

Cybercrime

Transnational Crime

Computer Crime

A and C are correct

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This refers to the intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.

Illegal Access

Illegal Interception

Data Interference

System Interference

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible.

Computer-related Forgery

Computer-related fraud

Computer related Identity theft

Cyber Libel

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This refers to the unauthorized access into or interference in a computer system/server, or information and communication system, or any access in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices without the knowledge and consent of the owner of the computer or information and communication system, including the introduction of computer viruses and the like resulting in the corruption, destruction, alteration, theft, or loss of electronic data messages or electronic documents.

Child Pornography

Photo or Video Voyeurism

Hacking

Access Device

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the type of malware that tricks the computer user into thinking that it is legitimate software, but actually contains hidden functions.

Backdoor

Trojan Horse

Virus

Computer Worm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the type of malware that is used to get unauthorized access to a website by the cybercriminals?

Backdoor

Trojan Horse

Virus

Computer Worm

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the type of scam in which the criminals attempt to obtain someone's personal information by pretending to be a legitimate business, a neighbor, or someone other innocent party?

Spoofing

Pharming

Redirectors

Floating windows

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?