Professional Documents
Culture Documents
T F T F T T F F T T: Name: Raghad Mohammed Abdullah Alqarni, ID: 442801838
T F T F T T F F T T: Name: Raghad Mohammed Abdullah Alqarni, ID: 442801838
O o
3. Ransomware is a type of malware that encrypts a victim's files and then
demands a ransom payment in exchange for the decryption key.
T
Question 2: Match the following types of cybercrime with their definitions: [3 Marks]
O
4. A type of malware that encrypts a victim's files and then demands a ransom payment
in exchange for the decryption key. (Ransomware)
o
5. A type of bullying that takes place online or through text messages.
(Cyberbullying)
CYS 26371 Fall 2023 HW#1
is
network. (Malware)
o
1. Which of the following is NOT a type of malware?
a. Virus
b. Trojan horse
c. Firewall s
d. Worm
e. Backdoor
2. Which of the following is NOT a best practice for creating a strong password?
a. Spear phishing
b. Whaling
c. Clone phishing
d. Denial-of-service attack
e. Man-in-the-middle attack
do
6. Which of the following is NOT a way that cybercriminals can steal your identity?
as
a. Phishing attacks
b. Physical theft
c. Malware attacks
d. Data breaches
e. Social engineering attacks
g
7. Which of the following is NOT a type of cyberespionage attack?
a. Waterhole attack
b. Supply chain attack
c. Spear phishing attack
d. Denial-of-service attack
e. Man-in-the-middle attack
8. Which of the following is NOT a way that governments and businesses can protect
themselves from cybercrime?
O
9. Which of the following is NOT a new and emerging cybercrime threat?
a. Deepfakes
b. Quantum computing
c. Artificial intelligence
d. Ransomware-as-a-service
e. All of the above are new and emerging cybercrime threats.
Question 4: What are some of the ways that you can protect yourself from cybercrime?
(Short answer)
[2 Marks]
There are many ways to protect my data, but the most popular is to use a strong and different
password for all my accounts, to constantly update the software, to redeem it, to back up my
data, to be aware of new attacks.