No student devices needed. Know more
20 questions
A cyber crime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
Cyber criminal
Phishing
Attack password
Online predator
What are the motives behind cyber crime?
Demanding ransom
Propagating religious or political beliefs
Financial loss to the target
Information thefts and manipulating data
All of the above
If you receive an email from a well-known company, but its name is misspelt in the sender’s address, you should:
click on the link in the email to check if it’s genuine
reply, pointing out the error
report it as a possible phishing scam
forward the email to a friend to check
Which of the following is not a type of cyber crime?
Thefting
Installing anti-virus
Forgery
Hacking
What are bad hackers also known as? (check all that apply)
Failing hackers
Black hat hackers
Cookie hackers
Cracker hackers
Are there more than 2 types of hackers?
Yes
No
A hacker who "uses their knowledge with permission to test vulnerabilities and other weakness and then offer details on how to improve the system" is a _____
Good hacker
Bad hacker
A hacker who "attacks the system without prior permission, which they might do to steal, alter, or destroy information, or to cause problems" is a _____.
Good hacker
Bad hacker
Hackers who engage in hacking for illeagal purposes are known as which of the following ?
Red hat hacker
Black hat hacker
Blue hat hacker
White hat hacker
Cybercrimes can be defined as the ____________ acts where the computer is used either as a tool or a target or both.
lawful
legal
unlawful
None of these
Examples of A Cybercrime where computer is used as a weapon
IPR VIOLATION
EFT FRAUDS
CREDIT CARD FRAUDS
ALL OF THESE
Cybercrimes can be divided into the following categories:
against an Individual person
against property
against an organization/society
All of these
A ___________ is a computer application designed to send spam emails automatically in large quantities.
robot
spammer
spambot
totbot
A ________ hat hacker is in between an Ethical Hacker and a Black hat hacker
Red
blue
grey
white
Explore all questions with a free account