This document defines and provides examples of common cybercrimes and cybersecurity measures. It discusses crimes like phishing, identity theft, and hacking that involve unauthorized access to personal information or computer systems. Viruses, ransomware, and cyberbullying are also covered. The document also outlines security tools like antivirus software, firewalls, passwords, and encryption that can help protect against cybercrimes by monitoring network traffic and securing sensitive data.
This document defines and provides examples of common cybercrimes and cybersecurity measures. It discusses crimes like phishing, identity theft, and hacking that involve unauthorized access to personal information or computer systems. Viruses, ransomware, and cyberbullying are also covered. The document also outlines security tools like antivirus software, firewalls, passwords, and encryption that can help protect against cybercrimes by monitoring network traffic and securing sensitive data.
This document defines and provides examples of common cybercrimes and cybersecurity measures. It discusses crimes like phishing, identity theft, and hacking that involve unauthorized access to personal information or computer systems. Viruses, ransomware, and cyberbullying are also covered. The document also outlines security tools like antivirus software, firewalls, passwords, and encryption that can help protect against cybercrimes by monitoring network traffic and securing sensitive data.
1. What term refers to criminal activities carried out using computers and the Internet?
a. Cybersecurity b. Cybercrimes c. Digital fraud d. Technological crimes
2. Which of the following is an example of a cybercrime? a. Pickpocketing b. Burglary c. Phishing d. Vandalism 3. Cybercrimes can involve: a. Unauthorized access to personal information b. Physical break-ins c. Vandalism of public property d. All of the above 4. What is the term for the deceptive attempt to acquire sensitive information by posing as a trustworthy entity? a. Identity theft b. Phishing c. Cyberbullying d. Ransomware 5. Which of the following is a form of online harassment that involves repeated, unwanted behaviour? a. Email spoofing b. Cyberstalking c. Cyberbullying d. Identity theft 6. Email spoofing involves: a. Sending fraudulent emails to obtain sensitive information b. Creating fake social media profiles c. Hacking email accounts d. Distributing malware through emails 7. What cybercrime involves the unauthorized access to personal information for financial gain? a. Identity theft b. Phishing c. Pharming d. Ransomware 8. Pharming is a cybercrime that: a. Involves creating fake websites to trick users into providing sensitive information b. Encrypts files and demands a ransom c. Targets individuals through deceptive emails d. Impersonates a legitimate entity to gain trust 9. What type of virus infects multiple types of files and programs? a. Boot sector virus b. Program file virus c. Multipartite virus d. Polymorphic virus 10. Which cybercrime involves the intentional disruption of computer systems and networks? a. Hacking b. Cybervandalism c. Network virus d. Cybersquatting 11. What term is used for the unauthorized access to computer systems or networks with the intent of gaining information? a. Hacking b. Cybersquatting c. Forgery d. Cyberextortion 12. What software is designed to detect and remove computer viruses? a. Firewall b. Encryption software c. Antivirus d. Biometrics 13. Which cybersecurity measure protects against unauthorized access to a computer or network? a. Cookies b. Passwords c. Encryption and decryption software d. Biometrics 14. What is a common method of securing sensitive information by converting it into a code that can only be deciphered by authorized individuals? a. Cookies b. Backups c. Encryption and decryption software d. Firewall 15. What cybersecurity measure helps prevent unauthorized access to a network by monitoring and controlling incoming and outgoing network traffic? a. Cookies b. Antivirus c. Firewall d. Backups 16. What is the term for criminal activities carried out using computers and the Internet? a. Cybersecurity b. Cybercrimes c. Digital fraud d. Technological crimes 17. Which of the following is an example of a cybercrime? a. Pickpocketing b. Burglary c. Phishing d. Vandalism 18. Cybercrimes can involve: a. Unauthorized access to personal information b. Physical break-ins c. Vandalism of public property d. All of the above 19. What is the term for the deceptive attempt to acquire sensitive information by posing as a trustworthy entity? a. Identity theft b. Phishing c. Cyberbullying d. Ransomware 20. Which of the following is a form of online harassment that involves repeated, unwanted behaviour? a. Email spoofing b. Cyberstalking c. Cyberbullying d. Identity theft 21. Email spoofing involves: a. Sending fraudulent emails to obtain sensitive information b. Creating fake social media profiles c. Hacking email accounts d. Distributing malware through emails 22. Cyberstalking typically refers to: a. Online tracking of personal finances b. Unwanted online attention or harassment c. Unauthorized access to email accounts d. Impersonation on social media 23. What cybercrime involves the unauthorized access to personal information for financial gain? a. Identity theft b. Phishing c. Pharming d. Ransomware 24. Pharming is a cybercrime that: a. Involves creating fake websites to trick users into providing sensitive information b. Encrypts files and demands a ransom c. Targets individuals through deceptive emails d. Impersonates a legitimate entity to gain trust 25. What is the term for creating a fake website or domain to deceive users into providing sensitive information? a. Identity theft b. Phishing c. Cybersquatting d. Cyberextortion 26. What type of virus infects multiple types of files and programs? a. Boot sector virus b. Program file virus c. Multipartite virus d. Polymorphic virus 27. Which cybercrime involves the intentional disruption of computer systems and networks? a. Hacking b. Cybervandalism c. Network virus d. Cybersquatting 28. What term is used for the unauthorized access to computer systems or networks with the intent of gaining information? a. Hacking b. Cybersquatting c. Forgery d. Cyberextortion 29. What type of virus changes its code to avoid detection by antivirus programs? a. Multipartite virus b. Polymorphic virus c. Boot sector virus d. Network virus 30. What is the act of creating and spreading malicious software with the intent to cause harm to computer systems? a. Hacking b. Virus propagation c. Cyberterrorism d. Cybersquatting 31. What software is designed to detect and remove computer viruses? a. Firewall b. Encryption software c. Antivirus d. Biometrics 32. Which cybersecurity measure protects against unauthorized access to a computer or network? a. Cookies b. Passwords c. Encryption and decryption software d. Biometrics 33. What is a common method of securing sensitive information by converting it into a code that can only be deciphered by authorized individuals? a. Cookies b. Backups c. Encryption and decryption software d. Firewall 34. What cybersecurity measure helps prevent unauthorized access to a network by monitoring and controlling incoming and outgoing network traffic? a. Cookies b. Antivirus c. Firewall d. Backups 35. Which of the following is a form of authentication based on unique physical characteristics such as fingerprints or retinal scans? a. Passwords b. Biometrics c. Cookies d. Encryption 36. How can individuals protect themselves from phishing attacks? a. Use strong and unique passwords b. Enable two-factor authentication c. Being cautious about clicking on links or providing personal information in unsolicited emails d. All of the above 37. What is the purpose of ransomware? a. To steal sensitive information b. To encrypt files and demand payment for their release c. To spread malicious software d. To impersonate a legitimate entity 38. What cybersecurity measure is designed to monitor and control the flow of data between a computer or network and the internet? a. Antivirus b. Firewall c. Encryption d. Biometrics 39. What is the primary goal of identity theft? a. To gain unauthorized access to computer systems b. To disrupt computer networks c. To steal personal information for financial gain d. To spread malware 40. How does social engineering differ from traditional hacking? a. Social engineering involves manipulating individuals to gain access to information b. Traditional hacking only targets organizations c. Social engineering is less sophisticated than traditional hacking d. Traditional hacking relies on physical break-ins 41. Which of the following are examples of cybercrimes against property? a. Identity theft b. Phishing c. Pharming d. Ransomware 42. Which cybersecurity measures can help protect against unauthorized access? a. Cookies b. Passwords c. Encryption and decryption software d. Biometrics 43. What are common examples of social engineering tactics? a. Impersonation b. Encryption c. Cookies d. Biometrics 44. Which types of viruses can infect multiple types of files and programs? a. Boot sector virus b. Program file virus c. Multipartite virus d. Polymorphic virus 45. What are common methods of securing sensitive information? a. Backups b. Encryption and decryption software c. Biometrics d. Cookies 46. What is the primary motive behind most cybercrimes? a. Political gain b. Financial gain c. Ideological reasons d. Personal revenge 47. Which of the following is a common characteristic of cybercriminals? a. High visibility in society b. Advanced technical skills c. Strict adherence to laws d. Transparent online presence 48. Cybercrimes can be classified into three main categories. Which of the following is NOT one of those categories? a. Cyberwarfare b. Cyberfraud c. Cyberterrorism d. Cyberespionage 49. What is the primary goal of cyberstalking? a. Financial gain b. Impersonation c. Unwanted online attention or harassment d. Political manipulation 50. Which cybercrime involves the creation of fake profiles or websites to deceive someone? a. Cyberbullying b. Email spoofing c. Impersonation d. Ransomware 51. What is a common method used in email spoofing? a. Encryption b. Changing IP addresses c. Altering email headers d. Biometric authentication 52. What is the main difference between phishing and pharming? a. Target audience b. Method of attack c. Time of occurrence d. Intent of the attacker 53. Which cybercrime involves altering the code of a legitimate website to redirect users to a fraudulent site? a. Phishing b. Pharming c. Ransomware d. Identity theft 54. In the context of cybercrimes, what does "spoofing" refer to? a. Creating fake profiles b. Impersonating a legitimate entity c. Distributing malware d. Encrypting files for ransom 55. What is the primary purpose of a DDoS (Distributed Denial of Service) attack? a. Unauthorized access to data b. Encryption of files c. Disrupting services by overwhelming a system d. Identity theft 56. Which term describes the act of intentionally defacing or destroying a website? a. Hacking b. Cybersquatting c. Cybervandalism d. Cyberterrorism 57. What is the primary goal of cybersquatting? a. Stealing sensitive information b. Disrupting online services c. Obtaining financial gain through a similar domain name d. Spreading malware 58. Which of the following is a common method for enhancing password security? a. Using the same password for multiple accounts b. Creating complex passwords with a mix of letters, numbers, and symbols c. Sharing passwords with trusted friends d. Keeping passwords written down in an easily accessible location 59. How does a firewall contribute to cybersecurity? a. By encrypting sensitive data b. By monitoring and controlling network traffic c. By removing computer viruses d. By managing biometric authentication 60. What is the purpose of biometric authentication in cybersecurity? a. Encrypting data b. Detecting computer viruses c. Verifying identity based on unique physical characteristics d. Controlling network traffic 61. What is the term for a cyberattack that involves overwhelming a computer system or network with traffic to make it unavailable to users? a. Phishing b. DDoS attack c. Ransomware d. Cyberespionage 62. In the context of cybercrimes, what does the term "social engineering" refer to? a. Unauthorized access to computer systems b. Manipulating individuals to disclose sensitive information c. Creating fake websites to trick users d. Encrypting files for ransom 63. Which of the following is a common tactic used in cyberextortion? a. Spreading malware b. Altering website content c. Threatening to reveal sensitive information unless a ransom is paid d. Unauthorized access to personal information 64. What distinguishes cyberbullying from other forms of online harassment? a. Financial motive b. Political motivation c. Repeated, unwanted behaviour d. Targeting organizations rather than individuals 65. How does email spoofing typically work? a. Intercepting email communication b. Sending fraudulent emails from a trusted source c. Creating fake email accounts d. Encrypting email messages 66. What is the primary objective of identity theft? a. Disrupting computer networks b. Gaining unauthorized access to personal information c. Spreading malware d. Encrypting files for ransom 67. What is the primary goal of phishing attacks? a. Spreading malware b. Stealing sensitive information by tricking users c. Altering website content d. Disrupting online services 68. How does pharming differ from phishing? a. Target audience b. Method of attack c. Intent of the attacker d. Time of occurrence 69. What is a common characteristic of ransomware attacks? a. Altering website content b. Encrypting files and demanding payment for their release c. Spreading malicious software through emails d. Creating fake profiles on social media 70. Which of the following is an example of cybersquatting? a. Altering website content b. Intentionally defacing a website c. Creating fake profiles on social media d. Registering a domain name with the intent to profit from a trademark 71. What is the primary goal of a virus in the context of cybercrimes? a. Unauthorized access to personal information b. Spreading malicious software c. Encrypting files for ransom d. Cyberespionage 72. How does a network virus differ from other types of viruses? a. It infects multiple types of files and programs b. It spreads through social engineering tactics c. It specifically targets personal information d. It disrupts computer networks 73. What role does encryption play in cybersecurity? a. Monitoring and controlling network traffic b. Detecting and removing computer viruses c. Converting sensitive information into a code for secure transmission d. Verifying identity based on unique physical characteristics 74. What is the purpose of using biometrics in cybersecurity? a. Creating complex passwords b. Encrypting sensitive data c. Authenticating users based on unique physical characteristics d. Monitoring network traffic 75. How can individuals enhance their cybersecurity when using passwords? a. Sharing passwords with trusted friends b. Using the same password for multiple accounts c. Creating unique and complex passwords d. Keeping passwords written down in an easily accessible location