Computer Crime, Privacy, And Security Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Sharvey2014
S
Sharvey2014
Community Contributor
Quizzes Created: 1 | Total Attempts: 4,918
Questions: 32 | Attempts: 4,918

SettingsSettingsSettings
Computer Crime, Privacy, And Security Quiz - Quiz

What do you know about cybercrime and cybersecurity? So, are you ready for this computer crime, privacy, and security quiz? Cybercrime which is also called computer crime, is known as the use of a computer as a tool to further illegal ends. Examples of these are committing fraud, trafficking in child pornography as well as intellectual property, identity theft, or violating privacy. These questions will educate you more about computer crime and security. All the best to you!


Questions and Answers
  • 1. 

    ________________ is a kind of denial of service attack in which SYN packets are repeatedly sent to every port on the server using fake IP addresses.

    • A.

      Cybergaming crime

    • B.

      Memory shaving

    • C.

      Syn flooding

    • D.

      Software piracy

    Correct Answer
    C. Syn flooding
    Explanation
    Syn flooding is a type of denial of service attack where SYN packets are continuously sent to every port on the server using fake IP addresses. This overwhelms the server's resources and prevents it from responding to legitimate requests, causing a denial of service for legitimate users. This attack takes advantage of the TCP handshake process, where the attacker sends numerous SYN packets but never completes the handshake, tying up server resources and rendering it inaccessible to others.

    Rate this question:

  • 2. 

    Only a small minority of U.S. employers observe employee phone calls, e-mails, Web browsing habits, and computer files.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement is True. While there may be some employers who observe employee phone calls, emails, web browsing habits, and computer files, it is only a small minority of them. This means that the majority of U.S. employers do not engage in such monitoring practices. However, it’s important to note that under federal law, employers may monitor employee conversations if the monitoring occurs in the ordinary course of business or if there is employee consent.

    Rate this question:

  • 3. 

    Computer crimes and cyber crimes are the same type of crimes.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Computer crimes and cyber crimes are not the same type of crimes. While they are related, they have distinct differences. Computer crimes refer to illegal activities that involve the use of a computer as a tool or target, such as hacking, unauthorized access, or data theft. On the other hand, cyber crimes encompass a broader range of criminal activities that occur in the digital realm, including computer crimes but also online fraud, identity theft, phishing, and more. Therefore, it is incorrect to consider them as the same type of crimes.

    Rate this question:

  • 4. 

    In data dibbling, a criminal obtains personal information to impersonate you.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    In data dibbling, a criminal does not obtain personal information to impersonate you. This statement implies that data dibbling involves obtaining personal information for the purpose of impersonation, which is incorrect. Data dibbling refers to the unauthorized access or manipulation of data, but it does not necessarily involve identity theft or impersonation.

    Rate this question:

  • 5. 

    Technologies that jeopardize anonymity

    • A.

      Cookies

    • B.

      Global Positioning System

    • C.

      GUIDs

    • D.

      Radio Frequency Identification

    • E.

      Bluetooth

    Correct Answer(s)
    A. Cookies
    C. GUIDs
    D. Radio Frequency Identification
    Explanation
    The technologies mentioned in the answer, namely cookies, GUIDs, and Radio Frequency Identification (RFID), can jeopardize anonymity. Cookies are small text files stored on a user's computer that track their online activities, potentially revealing personal information. GUIDs (Globally Unique Identifiers) are unique identifiers assigned to devices or users, making it easier to track their actions. RFID uses radio waves to identify and track objects or individuals, compromising anonymity if used without proper safeguards. Bluetooth, which is not mentioned in the answer, is a wireless technology for short-range communication and does not directly jeopardize anonymity.

    Rate this question:

  • 6. 

    To protect one's privacy online, individuals should

    • A.

      Use software that protects anonymity, such as Anonymous Surfing

    • B.

      Only give out personal information via Facebook.

    • C.

      Use throwaway email addresses.

    • D.

      Turn off cookies

    Correct Answer(s)
    A. Use software that protects anonymity, such as Anonymous Surfing
    C. Use throwaway email addresses.
    D. Turn off cookies
    Explanation
    To protect one's privacy online, individuals should use software that protects anonymity, such as Anonymous Surfing. This software helps to hide the user's IP address and encrypt their internet connection, making it difficult for others to track their online activities. Additionally, using throwaway email addresses can prevent personal information from being linked to a permanent email account. Turning off cookies can also enhance privacy as it prevents websites from tracking and storing user information. By following these practices, individuals can minimize the risk of their personal information being compromised online.

    Rate this question:

  • 7. 

    IP ____________ sends a message with an IP address disguised as a message from a trusted source.

    • A.

      Address

    • B.

      Man

    • C.

      Spoofing

    • D.

      Protocol

    Correct Answer
    C. Spoofing
    Explanation
    Spoofing is the correct answer because it involves sending a message with an IP address disguised as a message from a trusted source. This technique is commonly used by hackers to deceive recipients into thinking that the message is coming from a legitimate source, allowing them to gain unauthorized access or extract sensitive information. Spoofing can be done through various protocols, such as IP spoofing, email spoofing, or caller ID spoofing.

    Rate this question:

  • 8. 

    _______________ is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems

    • A.

      Hackers

    • B.

      Cybergangs

    • C.

      IP spoofing

    • D.

      Honeypot

    Correct Answer
    D. Honeypot
    Explanation
    A honeypot is a trap set to detect, deflect, or counteract attempts at unauthorized use of information systems. It is designed to attract and deceive potential attackers, making them believe they have found a vulnerable target. By luring hackers or cybergangs into the honeypot, organizations can gather information about their tactics, techniques, and intentions, and use this knowledge to enhance their security measures. Honeypots can also be used to divert attackers' attention away from real systems and protect sensitive data from being compromised.

    Rate this question:

  • 9. 

    The act of secretly removing RAM chips from office computers and selling them

    • A.

      Plagiarism

    • B.

      Memory shaving

    • C.

      Software piracy

    • D.

      Salami slicing

    Correct Answer
    B. Memory shaving
    Explanation
    Memory shaving refers to the act of secretly removing RAM chips from office computers and selling them. This is a form of theft as it involves unlawfully taking and selling someone else's property. It is different from software piracy, which involves the unauthorized copying and distribution of software, and salami slicing, which refers to a financial crime that involves stealing small amounts of money from many different accounts.

    Rate this question:

  • 10. 

    Alexa protects her privacy at school by never giving out her login password  and by having Safari save her login password to her Gmail account.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because saving login passwords to a Gmail account does not protect privacy at school. Sharing login passwords or storing them in an email account can compromise privacy and security. It is important to keep login credentials confidential and not share them with others.

    Rate this question:

  • 11. 

    To ensure one's privacy at work, refrain from making personal calls on a work phone and avoid using company email for personal purposes.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement suggests that in order to maintain privacy at work, it is important to avoid making personal calls on a work phone and using company email for personal purposes. This is because using work resources for personal matters can potentially compromise privacy and blur the boundaries between personal and professional life. Therefore, the answer "True" indicates that the statement is correct.

    Rate this question:

  • 12. 

    The following is an example of ______________. A cashier at a restaurant steals $0.05 from every bill she processes.

    • A.

      Salami slicing

    • B.

      Memory shaving

    • C.

      Data dibbling

    • D.

      Forgery

    Correct Answer
    A. Salami slicing
    Explanation
    The given scenario is an example of "salami slicing." Salami slicing refers to a method of stealing small amounts of money or data over a long period of time, with the hope that the theft will go unnoticed. In this case, the cashier steals $0.05 from each bill, which may seem insignificant individually but can accumulate to a substantial amount over time. This method allows the thief to avoid suspicion as the theft is spread out and not easily noticeable.

    Rate this question:

  • 13. 

    An area of law dedicated to computer crime

    • A.

      Cyberlaw

    • B.

      Cyberbulling

    • C.

      Cyberstalking

    • D.

      Cybercrime

    Correct Answer
    A. Cyberlaw
    Explanation
    Cyberlaw refers to the area of law that deals with legal issues related to computer crimes. It encompasses various aspects such as hacking, online fraud, identity theft, and illegal activities conducted on the internet. Cyberlaw aims to establish guidelines and regulations to prevent and prosecute cybercrimes, as well as protect individuals and organizations from digital threats. It also addresses issues such as online privacy, intellectual property rights, and electronic transactions. Therefore, cyberlaw is the correct answer as it specifically focuses on the legal framework surrounding computer crimes.

    Rate this question:

  • 14. 

    Maleek used several fake e-mails and social engineering to trick several coworkers into giving him their personal information.  This is an example.

    • A.

      Identity theft

    • B.

      Dumpster diving

    • C.

      Phishing attacks

    • D.

      Spear phishing

    Correct Answer
    D. Spear pHishing
    Explanation
    Spear phishing is the correct answer because Maleek used fake emails and social engineering techniques to specifically target and trick his coworkers into revealing their personal information. Unlike regular phishing attacks that cast a wide net, spear phishing involves personalized and targeted attacks, making it more effective in obtaining sensitive information.

    Rate this question:

  • 15. 

    The following is an example of ______________. Bromley opened an email that he thought was from his friend, but the email contained spyware, and it obtained all of his banking account information.

    • A.

      Identify theft

    • B.

      Phishing attacks

    • C.

      Dumpster diving

    • D.

      Spear phishing

    Correct Answer
    B. pHishing attacks
    Explanation
    The given scenario is an example of phishing attacks. Phishing attacks involve sending deceptive emails or messages that appear to be from a trusted source, such as a friend or a legitimate organization, with the intention of tricking the recipient into revealing sensitive information or downloading malicious software. In this case, Bromley opened an email that he believed was from his friend, but it turned out to be a phishing attempt that resulted in the installation of spyware and the theft of his banking account information.

    Rate this question:

  • 16. 

    The following is an example of ______________. Katherine often goes through her employers' garage cans and locates discarded files of their clients, and opens credit card accounts in their names.

    • A.

      Identify theft

    • B.

      Phishing attacks

    • C.

      Dumpster diving

    • D.

      Spear phishing

    Correct Answer(s)
    A. Identify theft
    C. Dumpster diving
    Explanation
    The given scenario describes dumpster diving, which is the act of searching through trash or discarded items to find valuable or sensitive information. In this case, Katherine is going through her employers' garbage cans to find discarded files of their clients and using that information to open credit card accounts in their names. This is a clear example of identity theft, as she is using someone else's personal information without their consent for fraudulent purposes.

    Rate this question:

  • 17. 

    Legislation currently in place in the United States to protect consumers from the computer and cyber crimes includes the

    • A.

      Fair Credit Bill Act

    • B.

      Health Insurance Portability and Privacy Act

    • C.

      Fair Health and Education Act

    • D.

      Family Education Rights and Privacy Act

    Correct Answer(s)
    B. Health Insurance Portability and Privacy Act
    D. Family Education Rights and Privacy Act
    Explanation
    The Health Insurance Portability and Privacy Act (HIPAA) is a legislation in the United States that protects consumers' health information and ensures its privacy. It establishes national standards for the security and confidentiality of individuals' medical records and other personal health information. The Family Education Rights and Privacy Act (FERPA) is another legislation that protects the privacy of students' education records. It gives parents certain rights with respect to their children's education records, such as the right to access and amend the records. Both acts play a crucial role in safeguarding consumers' personal information and protecting them from computer and cyber crimes.

    Rate this question:

  • 18. 

    To protect your privacy online, fill out forms only when the website displays

    • A.

      Http://

    • B.

      Ftps://

    • C.

      Ftp://

    • D.

      Https:

    Correct Answer
    D. Https:
    Explanation
    The correct answer is "https:" because the "https:" protocol is used for secure communication over a computer network. When a website displays "https:" in its URL, it means that the data transmitted between the user's browser and the website is encrypted and secure from potential eavesdropping or tampering. This ensures the privacy and protection of personal information entered into forms on the website.

    Rate this question:

  • 19. 

    These rogue programs remain dormant until triggered or activated.

    • A.

      Nuclear bombs

    • B.

      Worms

    • C.

      Time bomb

    • D.

      Logic bomb

    Correct Answer(s)
    C. Time bomb
    D. Logic bomb
    Explanation
    The given statement describes rogue programs that stay inactive until a specific event or condition occurs, at which point they become active and carry out their intended actions. This behavior is characteristic of both time bombs and logic bombs. Time bombs are programmed to activate at a specific date or time, while logic bombs are triggered by a specific logical condition being met. Therefore, both time bombs and logic bombs fit the description provided in the statement.

    Rate this question:

  • 20. 

    ______ are unsolicited messages sent via a cell phone or instant messaging service.

    • A.

      Spam

    • B.

      Virus

    • C.

      Spyware

    • D.

      Spim

    Correct Answer
    D. Spim
    Explanation
    Spim refers to unsolicited messages sent via a cell phone or instant messaging service. It is similar to spam emails but specifically targets mobile devices and messaging apps. Unlike viruses or spyware, spim does not aim to infect or harm devices but rather to annoy or deceive users with unwanted messages.

    Rate this question:

  • 21. 

    Cookies cannot be disabled.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    This statement is false because cookies can indeed be disabled. Cookies are small text files stored on a user's device that track their activity on a website. Users have the option to disable cookies in their web browser settings, which prevents websites from storing or accessing cookies on their device. Disabling cookies can help enhance privacy and security by preventing tracking and targeted advertising. Therefore, the correct answer is false.

    Rate this question:

  • 22. 

    An individual's ability to restrict or eliminate the collection, use, and sale of his/her confidential personal information

    • A.

      Ethics

    • B.

      Protection

    • C.

      Anonymity

    • D.

      Privacy

    Correct Answer
    D. Privacy
    Explanation
    Privacy refers to an individual's ability to restrict or eliminate the collection, use, and sale of his/her confidential personal information. It is an important aspect of ethics and protection, as it ensures that individuals have control over their personal data and can maintain their anonymity. Privacy allows individuals to determine who has access to their personal information and how it is used, thereby safeguarding their confidentiality and ensuring their personal autonomy.

    Rate this question:

  • 23. 

    A global unique identifier is an identification number produced by software or a piece of hardware.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A global unique identifier, often abbreviated as GUID, is indeed an identification number that is generated by software or hardware. This identifier is globally unique, meaning it is highly improbable for two different entities to have the same GUID. It is commonly used in various computer systems and databases to uniquely identify objects, records, or entities.

    Rate this question:

  • 24. 

    Examples of ubiquitous computing include the use of

    • A.

      Active badges

    • B.

      Cookies

    • C.

      Smartphones

    • D.

      Remote control

    Correct Answer(s)
    A. Active badges
    C. SmartpHones
    Explanation
    Ubiquitous computing refers to the concept of seamlessly integrating technology into our everyday lives. Active badges and smartphones are both examples of this, as they are devices that are constantly present and used by individuals. Active badges are wearable devices that track a person's location and provide information about their activities, while smartphones are handheld devices that have become essential for communication, internet access, and various other tasks. Both of these examples demonstrate how technology has become pervasive and integrated into our daily routines.

    Rate this question:

  • 25. 

    Viruses can spread via

    • A.

      Email attachments

    • B.

      Flash drives

    • C.

      Downloading software

    • D.

      Chats

    Correct Answer(s)
    A. Email attachments
    B. Flash drives
    C. Downloading software
    Explanation
    Viruses can spread through various means, including email attachments, flash drives, and downloading software. Email attachments can contain infected files that, when opened, can infect the recipient's computer. Flash drives can carry viruses that can be transferred to other devices when connected. Downloading software from untrusted sources can also lead to virus infections, as the software may contain malware. Therefore, it is important to exercise caution when dealing with email attachments, flash drives, and downloading software to prevent the spread of viruses.

    Rate this question:

  • 26. 

    RFID are used by used by stores to control ___________ and to identify lost  ___________and gather information about individuals from their _________

    • A.

      Inventory

    • B.

      Smartphones

    • C.

      Passports

    • D.

      Pets

    • E.

      GPS

    Correct Answer(s)
    A. Inventory
    C. Passports
    D. Pets
    Explanation
    RFID technology is utilized by stores to manage their inventory efficiently. By tagging products with RFID tags, stores can track and control their stock levels more accurately. Additionally, RFID tags are also used to identify lost passports, enabling authorities to locate and return them to their owners. Similarly, RFID tags are employed to identify and track pets, ensuring their safety and aiding in reuniting them with their owners. The technology can also be used to gather information about individuals through their passports, providing valuable insights for various purposes.

    Rate this question:

  • 27. 

    Types of rogue programs include

    • A.

      Logic puzzles

    • B.

      Time bombs

    • C.

      Worms

    • D.

      Keyloggers

    Correct Answer(s)
    B. Time bombs
    C. Worms
    D. Keyloggers
    Explanation
    The given answer is a list of types of rogue programs. Rogue programs are malicious software that can cause harm to a computer system. Time bombs are programs that are designed to activate or cause damage at a specific time or date. Worms are self-replicating programs that spread across networks and can cause damage. Keyloggers are programs that record keystrokes, allowing attackers to capture sensitive information such as passwords. Therefore, the correct answer includes time bombs, worms, and keyloggers as types of rogue programs.

    Rate this question:

  • 28. 

    Adware is a form of spyware that generates annoying pop-up and banner ads.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Adware is a type of software that displays unwanted advertisements, usually in the form of pop-up windows or banners. It is considered a form of spyware because it collects information about the user's browsing habits and interests in order to display targeted ads. These ads can be disruptive and intrusive, often appearing without the user's consent. Therefore, the statement that adware generates annoying pop-up and banner ads is true.

    Rate this question:

  • 29. 

    _______ are transparent graphic images placed on a Web site or in an e-mail used to monitor Web or e-mail behavior

    • A.

      Beacons

    • B.

      Viruses

    • C.

      Cookies

    • D.

      Spam

    Correct Answer
    A. Beacons
    Explanation
    Beacons are transparent graphic images that are placed on a website or in an email to monitor web or email behavior. They are often used by marketers to track user interactions, such as opening an email or visiting a specific webpage. Beacons allow companies to gather data on user behavior, such as the number of times an email is opened or the pages visited on a website. This information can then be used to analyze user engagement and tailor marketing strategies accordingly.

    Rate this question:

  • 30. 

    Passwords should consist of _______________

    • A.

      Lowercase letters

    • B.

      Numbers

    • C.

      Uppercase letters

    • D.

      Pets name

    • E.

      Special characters

    • F.

      Names of people close to you

    Correct Answer(s)
    A. Lowercase letters
    B. Numbers
    C. Uppercase letters
    E. Special characters
    Explanation
    Passwords should consist of a combination of lowercase letters, numbers, uppercase letters, and special characters. This combination helps to enhance the complexity and strength of the password, making it more difficult for hackers to guess or crack. Including a variety of character types increases the number of possible combinations, making the password more secure. Using personal information such as pets' names or names of people close to you can make the password easier to guess, so it is generally recommended to avoid using such information in passwords.

    Rate this question:

  • 31. 

    _________________  activities committed using the Internet  that violate state, federal, or international laws.

    • A.

      Hacker

    • B.

      Cybercime

    • C.

      Computer crime

    • D.

      Spector

    Correct Answer
    B. Cybercime
    Explanation
    Cybercrime refers to illegal activities conducted using the Internet that violate state, federal, or international laws. This can include hacking, online fraud, identity theft, spreading malware, and other malicious activities. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, or cause financial harm. The term "cybercrime" encompasses a wide range of illegal activities committed in the digital realm, highlighting the growing need for cybersecurity measures to protect individuals, organizations, and governments from these threats.

    Rate this question:

  • 32. 

    To avoid having to remember your passwords and account numbers, always save them on your computer.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Saving passwords and account numbers on a computer is not a secure practice. It increases the risk of unauthorized access to sensitive information. Storing passwords and account numbers on a computer can make them vulnerable to hacking, malware, or theft. It is recommended to use secure password managers or other offline methods to store and manage passwords and account numbers.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Nov 14, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 18, 2013
    Quiz Created by
    Sharvey2014
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.