You are on page 1of 4

1. What term refers to criminal activities carried out using computers and the Internet?

a. Cybersecurity b. Cybercrimes c. Digital fraud d. Technological crimes


2. Which of the following is an example of a cybercrime?
a. Pickpocketing b. Burglary c. Phishing d. Vandalism
3. Cybercrimes can involve:
a. Unauthorized access to personal information b. Physical break-ins
c. Vandalism of public property d. All of the above
4. What is the term for the deceptive attempt to acquire sensitive information by posing as a trustworthy entity?
a. Identity theft b. Phishing c. Cyberbullying d. Ransomware
5. Which of the following is a form of online harassment that involves repeated, unwanted behaviour?
a. Email spoofing b. Cyberstalking c. Cyberbullying d. Identity theft
6. Email spoofing involves:
a. Sending fraudulent emails to obtain sensitive information b. Creating fake social media profiles
c. Hacking email accounts d. Distributing malware through emails
7. What cybercrime involves the unauthorized access to personal information for financial gain?
a. Identity theft b. Phishing c. Pharming d. Ransomware
8. Pharming is a cybercrime that:
a. Involves creating fake websites to trick users into providing sensitive information
b. Encrypts files and demands a ransom
c. Targets individuals through deceptive emails
d. Impersonates a legitimate entity to gain trust
9. What type of virus infects multiple types of files and programs?
a. Boot sector virus b. Program file virus c. Multipartite virus d. Polymorphic virus
10. Which cybercrime involves the intentional disruption of computer systems and networks?
a. Hacking b. Cybervandalism c. Network virus d. Cybersquatting
11. What term is used for the unauthorized access to computer systems or networks with the intent of gaining information?
a. Hacking b. Cybersquatting c. Forgery d. Cyberextortion
12. What software is designed to detect and remove computer viruses?
a. Firewall b. Encryption software c. Antivirus d. Biometrics
13. Which cybersecurity measure protects against unauthorized access to a computer or network?
a. Cookies b. Passwords c. Encryption and decryption software d. Biometrics
14. What is a common method of securing sensitive information by converting it into a code that can only be deciphered by
authorized individuals?
a. Cookies b. Backups c. Encryption and decryption software d. Firewall
15. What cybersecurity measure helps prevent unauthorized access to a network by monitoring and controlling incoming
and outgoing network traffic?
a. Cookies b. Antivirus c. Firewall d. Backups
16. What is the term for criminal activities carried out using computers and the Internet?
a. Cybersecurity b. Cybercrimes c. Digital fraud d. Technological crimes
17. Which of the following is an example of a cybercrime?
a. Pickpocketing b. Burglary c. Phishing d. Vandalism
18. Cybercrimes can involve:
a. Unauthorized access to personal information b. Physical break-ins
c. Vandalism of public property d. All of the above
19. What is the term for the deceptive attempt to acquire sensitive information by posing as a trustworthy entity?
a. Identity theft b. Phishing c. Cyberbullying d. Ransomware
20. Which of the following is a form of online harassment that involves repeated, unwanted behaviour?
a. Email spoofing b. Cyberstalking c. Cyberbullying d. Identity theft
21. Email spoofing involves:
a. Sending fraudulent emails to obtain sensitive information b. Creating fake social media profiles
c. Hacking email accounts d. Distributing malware through emails
22. Cyberstalking typically refers to:
a. Online tracking of personal finances b. Unwanted online attention or harassment
c. Unauthorized access to email accounts d. Impersonation on social media
23. What cybercrime involves the unauthorized access to personal information for financial gain?
a. Identity theft b. Phishing c. Pharming d. Ransomware
24. Pharming is a cybercrime that:
a. Involves creating fake websites to trick users into providing sensitive information
b. Encrypts files and demands a ransom
c. Targets individuals through deceptive emails
d. Impersonates a legitimate entity to gain trust
25. What is the term for creating a fake website or domain to deceive users into providing sensitive information?
a. Identity theft b. Phishing c. Cybersquatting d. Cyberextortion
26. What type of virus infects multiple types of files and programs?
a. Boot sector virus b. Program file virus c. Multipartite virus d. Polymorphic virus
27. Which cybercrime involves the intentional disruption of computer systems and networks?
a. Hacking b. Cybervandalism c. Network virus d. Cybersquatting
28. What term is used for the unauthorized access to computer systems or networks with the intent of gaining information?
a. Hacking b. Cybersquatting c. Forgery d. Cyberextortion
29. What type of virus changes its code to avoid detection by antivirus programs?
a. Multipartite virus b. Polymorphic virus c. Boot sector virus d. Network virus
30. What is the act of creating and spreading malicious software with the intent to cause harm to computer systems?
a. Hacking b. Virus propagation c. Cyberterrorism d. Cybersquatting
31. What software is designed to detect and remove computer viruses?
a. Firewall b. Encryption software c. Antivirus d. Biometrics
32. Which cybersecurity measure protects against unauthorized access to a computer or network?
a. Cookies b. Passwords c. Encryption and decryption software d. Biometrics
33. What is a common method of securing sensitive information by converting it into a code that can only be deciphered by
authorized individuals?
a. Cookies b. Backups c. Encryption and decryption software d. Firewall
34. What cybersecurity measure helps prevent unauthorized access to a network by monitoring and controlling incoming
and outgoing network traffic?
a. Cookies b. Antivirus c. Firewall d. Backups
35. Which of the following is a form of authentication based on unique physical characteristics such as fingerprints or retinal
scans?
a. Passwords b. Biometrics c. Cookies d. Encryption
36. How can individuals protect themselves from phishing attacks?
a. Use strong and unique passwords b. Enable two-factor authentication
c. Being cautious about clicking on links or providing personal information in unsolicited emails d. All of the above
37. What is the purpose of ransomware?
a. To steal sensitive information b. To encrypt files and demand payment for their release
c. To spread malicious software d. To impersonate a legitimate entity
38. What cybersecurity measure is designed to monitor and control the flow of data between a computer or network and
the internet?
a. Antivirus b. Firewall c. Encryption d. Biometrics
39. What is the primary goal of identity theft?
a. To gain unauthorized access to computer systems b. To disrupt computer networks
c. To steal personal information for financial gain d. To spread malware
40. How does social engineering differ from traditional hacking?
a. Social engineering involves manipulating individuals to gain access to information
b. Traditional hacking only targets organizations
c. Social engineering is less sophisticated than traditional hacking
d. Traditional hacking relies on physical break-ins
41. Which of the following are examples of cybercrimes against property?
a. Identity theft b. Phishing c. Pharming d. Ransomware
42. Which cybersecurity measures can help protect against unauthorized access?
a. Cookies b. Passwords c. Encryption and decryption software d. Biometrics
43. What are common examples of social engineering tactics?
a. Impersonation b. Encryption c. Cookies d. Biometrics
44. Which types of viruses can infect multiple types of files and programs?
a. Boot sector virus b. Program file virus c. Multipartite virus d. Polymorphic virus
45. What are common methods of securing sensitive information?
a. Backups b. Encryption and decryption software c. Biometrics d. Cookies
46. What is the primary motive behind most cybercrimes?
a. Political gain b. Financial gain c. Ideological reasons d. Personal revenge
47. Which of the following is a common characteristic of cybercriminals?
a. High visibility in society b. Advanced technical skills
c. Strict adherence to laws d. Transparent online presence
48. Cybercrimes can be classified into three main categories. Which of the following is NOT one of those categories?
a. Cyberwarfare b. Cyberfraud c. Cyberterrorism d. Cyberespionage
49. What is the primary goal of cyberstalking?
a. Financial gain b. Impersonation c. Unwanted online attention or harassment d. Political manipulation
50. Which cybercrime involves the creation of fake profiles or websites to deceive someone?
a. Cyberbullying b. Email spoofing c. Impersonation d. Ransomware
51. What is a common method used in email spoofing?
a. Encryption b. Changing IP addresses c. Altering email headers d. Biometric authentication
52. What is the main difference between phishing and pharming?
a. Target audience b. Method of attack c. Time of occurrence d. Intent of the attacker
53. Which cybercrime involves altering the code of a legitimate website to redirect users to a fraudulent site?
a. Phishing b. Pharming c. Ransomware d. Identity theft
54. In the context of cybercrimes, what does "spoofing" refer to?
a. Creating fake profiles b. Impersonating a legitimate entity
c. Distributing malware d. Encrypting files for ransom
55. What is the primary purpose of a DDoS (Distributed Denial of Service) attack?
a. Unauthorized access to data b. Encryption of files
c. Disrupting services by overwhelming a system d. Identity theft
56. Which term describes the act of intentionally defacing or destroying a website?
a. Hacking b. Cybersquatting c. Cybervandalism d. Cyberterrorism
57. What is the primary goal of cybersquatting?
a. Stealing sensitive information b. Disrupting online services
c. Obtaining financial gain through a similar domain name d. Spreading malware
58. Which of the following is a common method for enhancing password security?
a. Using the same password for multiple accounts
b. Creating complex passwords with a mix of letters, numbers, and symbols
c. Sharing passwords with trusted friends
d. Keeping passwords written down in an easily accessible location
59. How does a firewall contribute to cybersecurity?
a. By encrypting sensitive data b. By monitoring and controlling network traffic
c. By removing computer viruses d. By managing biometric authentication
60. What is the purpose of biometric authentication in cybersecurity?
a. Encrypting data b. Detecting computer viruses
c. Verifying identity based on unique physical characteristics d. Controlling network traffic
61. What is the term for a cyberattack that involves overwhelming a computer system or network with traffic to make it
unavailable to users?
a. Phishing b. DDoS attack c. Ransomware d. Cyberespionage
62. In the context of cybercrimes, what does the term "social engineering" refer to?
a. Unauthorized access to computer systems b. Manipulating individuals to disclose sensitive information
c. Creating fake websites to trick users d. Encrypting files for ransom
63. Which of the following is a common tactic used in cyberextortion?
a. Spreading malware b. Altering website content
c. Threatening to reveal sensitive information unless a ransom is paid d. Unauthorized access to personal information
64. What distinguishes cyberbullying from other forms of online harassment?
a. Financial motive b. Political motivation
c. Repeated, unwanted behaviour d. Targeting organizations rather than individuals
65. How does email spoofing typically work?
a. Intercepting email communication b. Sending fraudulent emails from a trusted source
c. Creating fake email accounts d. Encrypting email messages
66. What is the primary objective of identity theft?
a. Disrupting computer networks b. Gaining unauthorized access to personal information
c. Spreading malware d. Encrypting files for ransom
67. What is the primary goal of phishing attacks?
a. Spreading malware b. Stealing sensitive information by tricking users
c. Altering website content d. Disrupting online services
68. How does pharming differ from phishing?
a. Target audience b. Method of attack c. Intent of the attacker d. Time of occurrence
69. What is a common characteristic of ransomware attacks?
a. Altering website content b. Encrypting files and demanding payment for their release
c. Spreading malicious software through emails d. Creating fake profiles on social media
70. Which of the following is an example of cybersquatting?
a. Altering website content b. Intentionally defacing a website
c. Creating fake profiles on social media d. Registering a domain name with the intent to profit from a trademark
71. What is the primary goal of a virus in the context of cybercrimes?
a. Unauthorized access to personal information b. Spreading malicious software
c. Encrypting files for ransom d. Cyberespionage
72. How does a network virus differ from other types of viruses?
a. It infects multiple types of files and programs b. It spreads through social engineering tactics
c. It specifically targets personal information d. It disrupts computer networks
73. What role does encryption play in cybersecurity?
a. Monitoring and controlling network traffic
b. Detecting and removing computer viruses
c. Converting sensitive information into a code for secure transmission
d. Verifying identity based on unique physical characteristics
74. What is the purpose of using biometrics in cybersecurity?
a. Creating complex passwords b. Encrypting sensitive data
c. Authenticating users based on unique physical characteristics d. Monitoring network traffic
75. How can individuals enhance their cybersecurity when using passwords?
a. Sharing passwords with trusted friends b. Using the same password for multiple accounts
c. Creating unique and complex passwords d. Keeping passwords written down in an easily accessible location

You might also like