You are on page 1of 2

INTRODUCTION TO CYBERCRIME AND ENVIRONMENTAL LAWS AND PROTECTION.

1. An Individual who uses computer, networking or other skill to overcome a technical problem.
a. Hacker
b. Technician
c. Programmers
d. Gamers
2. Intentionally gain unauthorized access to networks and system with malicious intent, whether
to steal data, spread malware or profit from ransomware.
a. Gray hat hackers
b. Red hat hackers
c. White hat hackers
d. Black hat hackers
3. Also known as ethical hackers, strive to operate in public’s best interest, rather than to create
turmoil.
a. Gray hat hackers
b. Red hat hackers
c. White hat hackers
d. Black hat hackers
4. Fall somewhere between white hat hackers and black hat hackers.
a. Gray hat hackers
b. Red hat hackers
c. White hat hackers
d. Black hat hackers
5. Using ____________hacking technique, an attacker can buy advertising spaces on the websites.
a. Cookie theft
b. Bait and switch
c. Virus, Total etc.
d. Clickjacking attackers
6. The _____________of the browser keep our personal data such as browsing history, username,
and passwords for different sites that we access.
a. Cookie theft
b. Bait and switch
c. Virus, Total etc.
d. Clickjacking attackers
7. It is also known by a different name, UI Redress.
a. Cookie theft
b. Bait and switch
c. Virus, Total etc.
d. Clickjacking attackers
8. ___________ are malicious software programs which get installed into victim’s system and
keeps sending the victims data to the hacker.
a. Cookie theft
b. Bait and switch
c. Virus, Total etc.
d. Clickjacking attackers
9. __________ is a hacking technique using which a hacker replicates the most-accessed sites and
traps the victim by sending that spoofed link.
a. Denial of service
b. Phishing
c. Keylogger
d. Eavesdropping
10. The motive behind ____________ is not to harm the system but to get some information
without being identified.
a. Denial of service
b. Phishing
c. Keylogger
d. Eavesdropping

You might also like