
Cybercrime and Computer Laws Review Exam

Quiz
•
Social Studies
•
University
•
Medium
El Señor
Used 2+ times
FREE Resource
81 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the use of a computer as an instrument to further illegal ends?
Cybercrime
Transnational Crime
Computer Crime
A and C are correct
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This refers to the intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.
Illegal Access
Illegal Interception
Data Interference
System Interference
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible.
Computer-related Forgery
Computer-related fraud
Computer related Identity theft
Cyber Libel
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This refers to the unauthorized access into or interference in a computer system/server, or information and communication system, or any access in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices without the knowledge and consent of the owner of the computer or information and communication system, including the introduction of computer viruses and the like resulting in the corruption, destruction, alteration, theft, or loss of electronic data messages or electronic documents.
Child Pornography
Photo or Video Voyeurism
Hacking
Access Device
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the type of malware that tricks the computer user into thinking that it is legitimate software, but actually contains hidden functions.
Backdoor
Trojan Horse
Virus
Computer Worm
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the type of malware that is used to get unauthorized access to a website by the cybercriminals?
Backdoor
Trojan Horse
Virus
Computer Worm
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the type of scam in which the criminals attempt to obtain someone's personal information by pretending to be a legitimate business, a neighbor, or someone other innocent party?
Spoofing
Pharming
Redirectors
Floating windows
Create a free account and access millions of resources
Similar Resources on Wayground
Popular Resources on Wayground
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World

Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
20 questions
ELA Advisory Review

Quiz
•
7th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns

Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade