100% found this document useful (1 vote)
2K views

Quiz Answer

The document discusses various cybersecurity topics including cyber bullying, plagiarism, Trojans, viruses, worms, copyright, and identifies the harms of cyber bullying and viruses. It also defines software piracy, malware, spam, and discusses hackers and hacktivism. Identity theft is briefly defined and techniques criminals use to steal identities and ways to protect identities are described. Key terms are matched to their definitions including phishing, pharming, honey pots, and denial-of-service attacks.

Uploaded by

Jaya Malathy
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views

Quiz Answer

The document discusses various cybersecurity topics including cyber bullying, plagiarism, Trojans, viruses, worms, copyright, and identifies the harms of cyber bullying and viruses. It also defines software piracy, malware, spam, and discusses hackers and hacktivism. Identity theft is briefly defined and techniques criminals use to steal identities and ways to protect identities are described. Key terms are matched to their definitions including phishing, pharming, honey pots, and denial-of-service attacks.

Uploaded by

Jaya Malathy
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

1: Cyber bullying is

a) harmful
b) done over the internet and cell phone
c) against the law
d) all of above

________________________________________
2: plagiarism is
a) bundle of rights.
b) hidden inside of a program.
c) using someone else's information as your own.
d) none of the above

________________________________________
3: Trojans is
a) a computer program that is designed to cause trouble in your computer
b) protection from bullying
c) is a person or company who own exclusive rights of the original work.
d) none of the above

________________________________________
4: Viruses
a) destroys computer files.
b) hurts someone through cell phone.
c) protects people from cyber bullying
d) none of the above

________________________________________
5: Worms can
a) stealing ideas from computers
b) multiply over and over again.
c) All the above
d) none of the above

________________________________________
6: Copy right is
a) owned by a person or company
b) gives protection to the author and creator of original work.
c) bundle of rights
d) all the above

________________________________________
7: Which of these can be done over the chat rooms, text messaging/text, virtual?
a) Trojans
b) Cyber bullying
c) Viruses
d) Copy right infringements
e) All the above

________________________________________
8: Which of these is protectable under the copy right law?
a) a professional worker
b) a dog
c) original work
d) A and b

________________________________________
9: Which of these causes depression?
a) Viruses
b) Trojans
c) Cyber bullying
d) none of the above

________________________________________
10: Which of these can be found on the internet?
a) plagiarism/trojans
b) viruses/worms
c) original work
d) A and B


11: Which of the following is a computer program designed to secretly invade systems and either modify the way in which
they operate or alter the information they store?
a) Computer virus
b) Software piracy
c) Malware
d) Spam

12: Which of the following is the unauthorized duplication of software or the illegal transfer of data from one storage
medium to another?
a) Computer virus
b) Software piracy
c) Malware
d) Spam

13: Which of the following is unsolicited commercial bulk email whose primary purpose is the commercial advertisement
or promotion of a commercial product or service?
a) Cyberterrorism
b) Terrorism
c) Spam
d) Malware

15.Which of the following is an example of biometrics:
a) DNA
b) Fingerprints
c) Voice prints
d) All of the above

16.In the early days of computing (1960's to the early 1970's), a "hacker" was:
a) An incompetent programmer who wrote programs that did not work properly
b) A busy programmer who reused code to save time
c) A creative programmer who wrote very elegant or clever programs
d) A new programmer who wrote simple programs

17.Hacktivism is:
a) A political activist group promoting tougher anti-hacking laws
b) The counter-hacking techniques used by the FBI and other law enforcement agencies
c) The use of hacking to promote a political cause
d) A newsletter for hackers

18.Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is
recorded and studied are known as:
a) Honey pots
b) Digital surveillance
c) Computer entrapment
d) Hacker crackdown

19.Which of the following is NOT a program used by hackers to gain access to your computer:
a) Keyloggers
b) Trojans
c) Rootkits
d) Honey pots




Essay Questions

a. Briefly define identity theft.








b. Describe two techniques criminals can use to gather the information they need to steal an identity.







c. Describe two ways a person can protect their identity.









d. Describe two ways a business can protect its customers from identity thieves.















Matching Questions

phishing an attack in which hackers overload a target site with requests for information.

pharming hacking to promote a political cause

honey pots Web sites that are specifically designed to be attractive to hackers

hactivism planting false Internet addresses in the tables on a Domain Name Server (DNS) so
that when someone types a URL, they are re-directed to a bogus site
denial-of-service (DOS) sending millions of emails fishing for information to use to impersonate someone
and steal money or goods

You might also like