Cyber Crime Awareness Quiz Test

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Tsdikshit
T
Tsdikshit
Community Contributor
Quizzes Created: 1 | Total Attempts: 11,060
| Attempts: 11,061 | Questions: 10
Please wait...
Question 1 / 10
0 %
0/100
Score 0/100
1. A coffee shop that collects payments from customers by debit / credit cards would be liable under the data privacy law

Explanation

A coffee shop that collects payments from customers by debit/credit cards would be liable under the data privacy law because they are handling sensitive financial information of their customers. The data privacy law is designed to protect personal information and ensure that businesses handle it securely. Collecting payments through debit/credit cards involves storing and processing customer data, which makes the coffee shop responsible for protecting that data from unauthorized access or breaches. Therefore, they would be liable under the data privacy law.

Submit
Please wait...
About This Quiz
Cyber Crime Awareness Quiz Test - Quiz

The Cyber Crime Awareness Quiz Test assesses knowledge on data privacy laws, cyber threats like remote administration Trojans, social engineering tactics, website tracing, Google hacking codes, and types... see moreof password attacks. It's essential for understanding and mitigating cyber risks. see less

2. A Social engineer convinces a person to give him sensitive information without his knowledge.

Explanation

In this scenario, the statement is describing a situation where a social engineer is able to manipulate and deceive a person into unknowingly divulging sensitive information. This is a common tactic used by social engineers, who often rely on psychological manipulation and social skills to exploit human vulnerabilities. Therefore, the answer "True" indicates that the statement accurately describes a social engineering technique.

Submit
3. Which of the following is an example of phishing, a common cybercrime?

Explanation

Phishing is a cybercrime where attackers impersonate legitimate organizations or individuals through email, text messages, or websites to trick people into revealing sensitive information like passwords, credit card details, or personal identification. The example of receiving an email asking for personal information is a typical phishing attempt. The other options describe good cybersecurity practices rather than forms of cybercrime.

Submit
4. How to trace website ?

Explanation

The given answer, http://www.domaintools.com/, is the correct answer for tracing a website. DomainTools is a website that provides various tools for investigating and analyzing domains, including domain ownership information, DNS records, and historical data. By using DomainTools, users can trace the details and history of a website, such as its registration information, IP address, and any associated domains or subdomains. This can be helpful for identifying the owner of a website, checking its credibility, or investigating any suspicious activities.

Submit
5. Which of the following is an effective way to protect yourself from cybercrime?

Explanation

One effective way to protect yourself from cybercrime is to install and regularly update antivirus software. This software helps detect and prevent malicious attacks, such as viruses, ransomware, or malware, from infecting your device. Using strong, unique passwords and avoiding suspicious links are also important safety measures, but answers A (using the same password), B (clicking on suspicious links), and D (sharing personal information on unsecured websites) increase your risk of becoming a victim of cybercrime.

Submit
6. A hacker can use a remote administration Trojan to shutdown an infected computer even if the power is switched off in the victim computer.

Explanation

A remote administration Trojan is a type of malware that allows a hacker to gain unauthorized access to a victim's computer. While it can enable the hacker to perform various malicious activities on the infected computer, such as stealing data or controlling it remotely, it does not have the capability to turn on or shut down the computer if the power is switched off. Therefore, the statement that a hacker can use a remote administration Trojan to shutdown an infected computer even if the power is switched off is false.

Submit
7. What is the google hacking code for Email ?

Explanation

The correct answer is "intitle:index.of inbox". This code is used in Google hacking to search for email inboxes that have been indexed by Google. By using the "intitle:" operator, it specifies that the search should focus on the title of the webpage. The "index.of" part indicates that the search is looking for directories or indexes. And finally, "inbox" specifies that the search is specifically for email inboxes.

Submit
8. What is SQL code among the 4 option ?

Explanation

The correct answer is "' or '1'='1'". This is an example of a SQL code injection attack. It is a technique used by hackers to exploit vulnerabilities in a website's database. In this case, the code is attempting to bypass any authentication checks by making the statement '1'='1' always evaluate to true, allowing unauthorized access to the database.

Submit
9. To understand your ip address which add on do you use ?

Explanation

Extreme IP is the add-on that can be used to understand your IP address.

Submit
10. What are types of password attack ?

Explanation

not-available-via-ai

Submit
View My Results

Quiz Review Timeline (Updated): Sep 9, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Sep 09, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 30, 2014
    Quiz Created by
    Tsdikshit
Cancel
  • All
    All (10)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A coffee shop that collects payments from customers by debit / credit...
A Social engineer convinces a person to give him sensitive information...
Which of the following is an example of phishing, a common cybercrime?
How to trace website ?
Which of the following is an effective way to protect yourself from...
A hacker can use a remote administration Trojan to shutdown an...
What is the google hacking code for Email ?
What is SQL code among the 4 option ?
To understand your ip address which add on do you use ?
What are types of password attack ?
Alert!

Advertisement