Crime and security Flashcards

(22 cards)

1
Q

What is cybercrime?

A

Criminal activities that are conducted via the internet or through the use of computer technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: Phishing is a method used to steal personal information.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: __________ is the practice of protecting systems, networks, and programs from digital attacks.

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is NOT a type of malware? (A) Virus (B) Trojan (C) Firewall (D) Worm

A

C) Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a firewall?

A

A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False: A strong password should include a mix of letters, numbers, and special characters.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is social engineering in the context of cybersecurity?

A

Manipulating individuals into divulging confidential or personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fill in the blank: __________ is software designed to disrupt, damage, or gain unauthorized access to computer systems.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of encryption?

A

To protect information by converting it into a code to prevent unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: All cybercrimes are reported to law enforcement.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the main goal of a hacker?

A

To gain unauthorized access to systems or data, often for malicious purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multiple Choice: Which of the following is a common method of gaining unauthorized access? (A) Keylogging (B) Antivirus software (C) Backup systems (D) Firewalls

A

A) Keylogging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is identity theft?

A

The fraudulent acquisition and use of a person’s private identifying information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fill in the blank: A __________ is a program that replicates itself to spread to other computers.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are two-factor authentication methods?

A

Security processes that require two different forms of identification before access is granted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or False: Cyberbullying can occur through social media platforms.

17
Q

Fill in the blank: __________ refers to unauthorized access to a computer or network.

18
Q

What is ransomware?

A

A type of malware that encrypts a user’s files and demands a ransom payment to restore access.

19
Q

Multiple Choice: Which of the following is a sign of a phishing attempt? (A) Unexpected emails requesting personal information (B) Emails from known contacts (C) Emails with clear subject lines (D) Professional language

A

A) Unexpected emails requesting personal information

20
Q

What is the role of an antivirus program?

A

To detect, prevent, and remove malicious software from a computer.

21
Q

True or False: Regular software updates can help protect against security vulnerabilities.

22
Q

What is the significance of a security breach?

A

It indicates that unauthorized access has occurred, potentially compromising sensitive data.