0% found this document useful (0 votes)
22 views1 page

Quiz 1

Practice quiz for the subject
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views1 page

Quiz 1

Practice quiz for the subject
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

 MENU

 201910486

Search courses 

Cybersecurity Law and Policy


Dashboard  My courses
 Cybersecurity Law and Policy 214301092124
 General  Quiz1_Spring 2020

Course dashboard 

Started on Wednesday, 10 February 2021,


5:55 PM

State Finished

Completed on Wednesday, 10 February 2021,


6:25 PM

Time taken 30 mins 1 sec

Marks 17.00/20.00

Grade 8.50 out of 10.00 (85%)

Question 1

Complete

Mark 1.00 out of 1.00

Flag question

All of the below options could be used to


resolve cybersecurity dispute before
reaching court room except:

Select one:
a. Arbitration Law

b. Dispositive Motions

c. Adminstrative Law

d. Mediation Law

The correct answer is: Adminstrative Law

Question 2

Complete

Mark 1.00 out of 1.00

Flag question

The hactivisim is considered as:

Select one:
a. Institutional Cybercrime

b. Inchoate cybercrime

c. Property Cybercrime

d. Personal Cybercrime

The correct answer is: Institutional


Cybercrime

Question 3

Complete

Mark 1.00 out of 1.00

Flag question

Assume you receive an email informing


you that you win a prize and asking you to
send your account number so they can
transfer price amount to your account.
This is an example of:

Select one:
a. ransomware attack

b. scam

c. cybersbullying

d. blakmail

The correct answer is: scam

Question 4

Complete

Mark 1.00 out of 1.00

Flag question

The Cybercrime punishment consists of:

Select one:
a. incarceration

b. fines

c. All of the above.

d. restitution to victims

The correct answer is: All of the above.

Question 5

Complete

Mark 1.00 out of 1.00

Flag question

________ will result from either an


insider committing a cyber offense or an
external party hacking into your computer
systems.

Select one:
a. Criminal cases

b. Criminal sanction

c. Dispositive motion

d. Civil cases

The correct answer is: Criminal cases

Question 6

Complete

Mark 0.00 out of 1.00

Flag question

Forfeiture Programs is used in


_________ cases to restrict criminal
from doing the crime again.

Select one:
a. Phishing

b. DDOS

c. Identity Theft

d. Cyber conspiracy

The correct answer is: Identity Theft

Question 7

Complete

Mark 1.00 out of 1.00

Flag question

Availability, integrity and secrecy of


information systems and networks in the
face of attacks, accidents and failures
with the goal of protecting operations and
assets is known as:

Select one:
a. cybersecurity

b. Cybercrime

c. corporate cybersecurity

d. national cybersecurity

The correct answer is: cybersecurity

Question 8

Complete

Mark 1.00 out of 1.00

Flag question

Crimes that have been started, but not


completed are known as:

Select one:
a. Property cybercrime

b. Cyberstalking

c. Cyber Slander

d. Inchoate

The correct answer is: Inchoate

Question 9

Complete

Mark 1.00 out of 1.00

Flag question

One of the following cybercrimes is not a


Personal cybercrime?

Select one:
a. ransomware attack

b. data theft

c. Denial of Service Attack

d. blakmail

The correct answer is: Denial of Service


Attack

Question 10

Complete

Mark 1.00 out of 1.00

Flag question

The practice of sending fraudulent emails


that appear to come from a reputable
source is known as:

Select one:
a. identity theft

b. Phishing Attack

c. Denial of Service attack

d. ransomware attack

The correct answer is: Phishing Attack

Question 11

Complete

Mark 8.00 out of 10.00

Flag question

Select the suitable terminology for each of


the following statements:

A computer
crime law
blakmail
that
addressed
public sector

A computer
crime law
The Computer Fraud and Abus
that
addressed
private sector

Signing up for
numerous
online mailing
lists and
services using Cyberstalking
a victim’s
name and
email
address is an
example of

The act of
preventing
the owner
from
Cybertrespass to Chattle
posessessing
or using the
property as
the owner
intended

A law that its


Mediation Law
results are
not binding

A law that
could be
Arbitration Law
used in inider
data theft
cases

John obtains
a cyber
service and
converts it to
Atomic Energy Act
his own
without
authorization,
such a case
belongs to

A law that
sets out the
rules by Regulatory law
various
governmental
agencies

A law that is
part of civil Civil cybersecurity law
legal system
is

A law that is
part of Public cyberlaw
criminal legal
system is

The correct answer is:

A computer crime law that addressed


public sector → Atomic Energy Act,

A computer crime law that addressed


private sector → The Computer Fraud and
Abuse Act,

Signing up for numerous online mailing


lists and services using a victim’s name
and email address is an example of →
Cyberstalking,

The act of preventing the owner from


posessessing or using the property as the
owner intended → Cybertrespass to
Chattle,

A law that its results are not binding →


Mediation Law,

A law that could be used in inider data


theft cases → Arbitration Law,

John obtains a cyber service and converts


it to his own without authorization, such a
case belongs to → Cyber-Conversion,

A law that sets out the rules by various


governmental agencies → Regulatory law,

A law that is part of civil legal system is →


Civil cybersecurity law,

A law that is part of criminal legal system


is → Public cyberlaw

Finish review

Assignment 1 distribution

Jump to...

Cyber Assignment 1

 Quiz navigation

1 2 3 4 5 6 7 8 9

10

Part Two

11

Show one page at a time

Finish review

© 2020 | Information Technology Center | Al Ain


University
:

You might also like