MENU
201910486
Search courses
Cybersecurity Law and Policy
Dashboard My courses
Cybersecurity Law and Policy 214301092124
General Quiz1_Spring 2020
Course dashboard
Started on Wednesday, 10 February 2021,
5:55 PM
State Finished
Completed on Wednesday, 10 February 2021,
6:25 PM
Time taken 30 mins 1 sec
Marks 17.00/20.00
Grade 8.50 out of 10.00 (85%)
Question 1
Complete
Mark 1.00 out of 1.00
Flag question
All of the below options could be used to
resolve cybersecurity dispute before
reaching court room except:
Select one:
a. Arbitration Law
b. Dispositive Motions
c. Adminstrative Law
d. Mediation Law
The correct answer is: Adminstrative Law
Question 2
Complete
Mark 1.00 out of 1.00
Flag question
The hactivisim is considered as:
Select one:
a. Institutional Cybercrime
b. Inchoate cybercrime
c. Property Cybercrime
d. Personal Cybercrime
The correct answer is: Institutional
Cybercrime
Question 3
Complete
Mark 1.00 out of 1.00
Flag question
Assume you receive an email informing
you that you win a prize and asking you to
send your account number so they can
transfer price amount to your account.
This is an example of:
Select one:
a. ransomware attack
b. scam
c. cybersbullying
d. blakmail
The correct answer is: scam
Question 4
Complete
Mark 1.00 out of 1.00
Flag question
The Cybercrime punishment consists of:
Select one:
a. incarceration
b. fines
c. All of the above.
d. restitution to victims
The correct answer is: All of the above.
Question 5
Complete
Mark 1.00 out of 1.00
Flag question
________ will result from either an
insider committing a cyber offense or an
external party hacking into your computer
systems.
Select one:
a. Criminal cases
b. Criminal sanction
c. Dispositive motion
d. Civil cases
The correct answer is: Criminal cases
Question 6
Complete
Mark 0.00 out of 1.00
Flag question
Forfeiture Programs is used in
_________ cases to restrict criminal
from doing the crime again.
Select one:
a. Phishing
b. DDOS
c. Identity Theft
d. Cyber conspiracy
The correct answer is: Identity Theft
Question 7
Complete
Mark 1.00 out of 1.00
Flag question
Availability, integrity and secrecy of
information systems and networks in the
face of attacks, accidents and failures
with the goal of protecting operations and
assets is known as:
Select one:
a. cybersecurity
b. Cybercrime
c. corporate cybersecurity
d. national cybersecurity
The correct answer is: cybersecurity
Question 8
Complete
Mark 1.00 out of 1.00
Flag question
Crimes that have been started, but not
completed are known as:
Select one:
a. Property cybercrime
b. Cyberstalking
c. Cyber Slander
d. Inchoate
The correct answer is: Inchoate
Question 9
Complete
Mark 1.00 out of 1.00
Flag question
One of the following cybercrimes is not a
Personal cybercrime?
Select one:
a. ransomware attack
b. data theft
c. Denial of Service Attack
d. blakmail
The correct answer is: Denial of Service
Attack
Question 10
Complete
Mark 1.00 out of 1.00
Flag question
The practice of sending fraudulent emails
that appear to come from a reputable
source is known as:
Select one:
a. identity theft
b. Phishing Attack
c. Denial of Service attack
d. ransomware attack
The correct answer is: Phishing Attack
Question 11
Complete
Mark 8.00 out of 10.00
Flag question
Select the suitable terminology for each of
the following statements:
A computer
crime law
blakmail
that
addressed
public sector
A computer
crime law
The Computer Fraud and Abus
that
addressed
private sector
Signing up for
numerous
online mailing
lists and
services using Cyberstalking
a victim’s
name and
email
address is an
example of
The act of
preventing
the owner
from
Cybertrespass to Chattle
posessessing
or using the
property as
the owner
intended
A law that its
Mediation Law
results are
not binding
A law that
could be
Arbitration Law
used in inider
data theft
cases
John obtains
a cyber
service and
converts it to
Atomic Energy Act
his own
without
authorization,
such a case
belongs to
A law that
sets out the
rules by Regulatory law
various
governmental
agencies
A law that is
part of civil Civil cybersecurity law
legal system
is
A law that is
part of Public cyberlaw
criminal legal
system is
The correct answer is:
A computer crime law that addressed
public sector → Atomic Energy Act,
A computer crime law that addressed
private sector → The Computer Fraud and
Abuse Act,
Signing up for numerous online mailing
lists and services using a victim’s name
and email address is an example of →
Cyberstalking,
The act of preventing the owner from
posessessing or using the property as the
owner intended → Cybertrespass to
Chattle,
A law that its results are not binding →
Mediation Law,
A law that could be used in inider data
theft cases → Arbitration Law,
John obtains a cyber service and converts
it to his own without authorization, such a
case belongs to → Cyber-Conversion,
A law that sets out the rules by various
governmental agencies → Regulatory law,
A law that is part of civil legal system is →
Civil cybersecurity law,
A law that is part of criminal legal system
is → Public cyberlaw
Finish review
Assignment 1 distribution
Jump to...
Cyber Assignment 1
Quiz navigation
1 2 3 4 5 6 7 8 9
10
Part Two
11
Show one page at a time
Finish review
© 2020 | Information Technology Center | Al Ain
University
: