ThatQuiz Test Library Take this test now
ICYBER PADZ4
Contributed by: Padrones
  • 1. A type of hacker that fall somewhere between white hat hackers and black hat hackers.
A) any of these
B) Black hat hacker
C) Gray hat hacker
D) White hat hacker
  • 2. Sato was hired by the City Mayor of Palawan to fixed the anomalies inside the cybergroup of his administration. Sato has been good and fixed easily the problem but little they didn't know she was did another thing there while fixing just to get more income as hacker. What kind of motives that Sato has?
A) Gray hat hacker
B) White hacker
C) Revenge
D) Greed
  • 3. What piece of software that runs user applications and provides interface to the hardware?
A) Operator
B) Boot sequence instructions
C) Operating Systems
D) Application Software
  • 4. What is the virtual computer world which is used to form a global computer networks to facilitate online communication
A) Cyber criminal
B) Cybersecurity
C) Cyberspace
D) Cybercrime
  • 5. All cybercrime are committed in the virtual world or space.
A) FALSE
B) TRUE
C) PARTIALLY TRUE
D) PARTIALLY FALSE
  • 6. A type of email that you did not request and do not want to receive from unknown individuals or organizations not in your mailing list
A) spoofing
B) spam
C) none of these
D) phishing
  • 7. It is the use of electronic messaging systems like e-mails and other digital delivery systems and broadcast media to send unwanted bulk messages indiscriminately.
A) Attacking
B) Hacking
C) Spamming
D) Loading
  • 8. is a part of the deep web. It is specifically designed to be anonymous and inaccessible through normal means.
A) surface web
B) deep web
C) any of these
D) dark web
  • 9. This occurs when defamation takes place with the help of computers and/or the Internet. E.g. someone publishes defamatory matter about another on a website.
A) Cyber Defamation
B) Cyber Pornography
C) Cyber Staking
D) Cyber Sex
  • 10. This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. An important feature of this type of offense is that alteration is so small that it would normally unnoticed.
A) Logic bomb
B) Salami Attack
C) Hacking
D) Theft of Information Contained in Electronic Form
  • 11. It refers to the market that are used to buy and sell recreational drugs online.
A) Dark web
B) Warehouse
C) Night Market
D) Public market
  • 12. What did the ?I LOVE YOU? virus demonstrate about computer-related crimes?
A) The importance of firewalls and antivirus software.
B) It revealed the vulnerability of government institutions.
C) There is a need for international cybersecurity treaties.
D) There is a potential for remote attacks causing widespread damage
  • 13. It is an activity done using computers and internet.
A) Cybercrime
B) Cybergroup
C) Cybersecurity
D) Cyberacts
  • 14. Hacking designed to cause terror.
A) Cyber defamation
B) Cyber pornography
C) Cyber ​​Terrosim
D) Cyber libel
  • 15. Gina, a bank employee inserts a program, into the bank's servers, that deducts a small amount of from the account of every customer. This unauthorized debt is likely to go unnoticed by an accountholder.

    Gina's act refers to what types of cybercrime?
A) Worm
B) DOS attack
C) Salami attack
D) Virus
  • 16. It is is when a perpetrator singles out a specific person and causes the person emotional distress and causes the individual to fear for his or her life, safety, or safety of others.
A) Wanting
B) Stalking
C) Hacking
D) Talking
  • 17. How did the I LOVE YOU virus spread?
A) By erasing system files
B) Through encrypted emails
C) By replicating and sending itself to email contacts
D) By encrypting the computer?s hard drive
  • 18. A hacking technique where the attacker can buy advertising spaces on the websites and when a user clicks on the ad, he might get directed to a page that's infected with malware.
A) Clickjacking
B) Cookie theft
C) virus
D) Bait and Switch
  • 19. What is the act of stealing creative expressions, patents, or trademarks from individuals or companies?
A) Hacking
B) Phishing
C) Intellectual property theft
D) Identity-based attack
  • 20. It refers to a content may be offensive in a nonspecific way, harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation.
A) Cyeber stalking
B) Online Stalking
C) Online Harassment
D) Online Degrading
  • 21. Who is hacker?
A) The valuable skills for computer programmers and technicians.
B) Computer Programming
C) The use of the Internet or other electronic means to stalk or harass an individual, group, or organization
D) Professional Technician
  • 22. It is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
A) Scamming
B) Phishing
C) Spoofing
D) Cyberstalking
  • 23. It refers to protecting the government and corporate networks, seeking to make it difficult for hackers to find and exploit vulnerabilities.
A) Cybercrime
B) Cyberacts
C) Cyberspace
D) Cybersecurity
  • 24. An utilizes hacking to cause violence against persons or property, or at least cause enough harm to generate fear.
A) Salami attack
B) Cyber Attack
C) Cyber terrorism
D) Cyber defamation
  • 25. Which offense is characterized by causing annoyance or irritation without falling under specific criminal offenses?
A) Cyber threats
B) Unjust vexation
C) Photo and video voyeurism
D) Cyber libel
  • 26. These attacks are often used in committing financial crime and are based on the idea that an alteration, so insignificant, would go completely unnoticed in a single case
A) Trojan attack
B) Email bombing
C) Salami attack
D) Email spoofing
  • 27. It is also known as Hacking. Involves gaining access illegally to a computer system or network and in some cases making unauthorized use of this access.
A) IP address
B) Spoofing
C) Unauthorized Access
D) Identity theft
  • 28. What is encompassed by data interference?
A) Intentional deletion of electronic documents
B) Introduction of computer viruses
C) Unauthorized alteration of computer data
D) All of the above
  • 29. Sato was hired by the City Mayor of Palawan to fixed the anomalies inside the cybergroup of his administration. Sato has been good and fixed easily the problem but little they didn't know she was did another thing there while fixing just to get more income as hacker. What kind of hacker is she?
A) Gray hat hacker
B) White hat hacker
C) Anomalies hacker
D) Black hat hacker
  • 30. Those are the responsible for the provision of services relating to a computer system.
A) Service Provider
B) PLDT
C) Compuer network
D) Traffic data
  • 31. It is also known as identity fraud, is a crime in which an imposter obtain key pieces of personally identifiable information, such as Social Security or driver's license numbers, in order to impersonate someone else.
A) Bank fraud
B) Identity theft
C) Carding
D) Extortion
  • 32. The is part of the internet that is accessible through search engines like google.
A) deep web
B) surface web
C) dark web
D) dark net web
  • 33. Some internet criminals threaten to or actually flood an internet site with millions of bogus messages and/or orders so that site services will be tied up and unable to perform as promised.
A) Internet Securities Fraud
B) Denial of Service attack
C) Illegal Copyright Infringement
D) Distributing Illegal Infringement
  • 34. A type of scam in which criminals attempt to obtain someone's personal information by pretending to be a legitimate business, neighbor or some other innocent party.
A) Pharming
B) Spoofing
C) Scamming
D) Phishing
  • 35. A hacker who also known as ethical hackers, strive to operate in the public's best interest, rather than to create turmoil.
A) Black hat hacker
B) any of these
C) White hat hacker
D) Gray hat hacker
Created with That Quiz — the site for test creation and grading in math and other subjects.