Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

CYS 26371 Fall 2023 HW#1

Name: Raghad Mohammed Abdullah Alqarni, ID: 442801838


Question 1: State whether the following statements are true or false. [5 Marks]

Statement True or False


1. Cybercrime is any crime that involves a computer or computer network. T
2. Phishing is a type of software that is designed to damage or disable a F
computer system or network.

O o
3. Ransomware is a type of malware that encrypts a victim's files and then
demands a ransom payment in exchange for the decryption key.
T

4. Malware is a type of social engineering attack where the attacker sends F


e
fake emails or text messages that appear to be from a legitimate company
or organization.
5. Identity theft is a crime where someone steals another person's personal T
information, such as their name, Social Security number, or credit card
number, and uses it to commit fraud.
6. Cyberbullying is a type of bullying that takes place online or through text T
messages.
t
no F
D
7. Cyberespionage is only a threat to governments and large corporations.
8. It is impossible to protect yourself from cybercrime.
y F
9. Strong passwords and two-factor authentication are two of the best ways T
to protect yourself from cybercrime.
10. It is important to report cybercrime to the appropriate authorities. T

Question 2: Match the following types of cybercrime with their definitions: [3 Marks]

Phishing Malware Ransomware Identity theft Cyberbullying


Cyberespionage

1. The theft of confidential information from a government or business organization.


(Cyberespionage) cyberespionage
2. A type of social engineering attack where the attacker sends fake emails or text
messages that appear to be from a legitimate company or organization.
(Phishing)
3. A type of crime where someone steals another person's personal information, such
as their name, Social Security number, or credit card number, and uses it to commit
fraud. (Identity theft) identitytheft

O
4. A type of malware that encrypts a victim's files and then demands a ransom payment
in exchange for the decryption key. (Ransomware)

o
5. A type of bullying that takes place online or through text messages.
(Cyberbullying)
CYS 26371 Fall 2023 HW#1

6. A type of software that is designed to damage or disable a computer system or

is
network. (Malware)

Question 3: Multiple Choice Questions [5 Marks]

o
1. Which of the following is NOT a type of malware?
a. Virus
b. Trojan horse
c. Firewall s
d. Worm
e. Backdoor

2. Which of the following is NOT a best practice for creating a strong password?

a. Use at least 12 characters.


b. Update your passwords regularly.
c. Include a mix of upper and lowercase letters, numbers, and symbols.
d. Avoid using easily guessed words or phrases, such as your name, birthday, or
address.
e. Use a different password for each online account.

3. Which of the following is NOT a type of phishing attack?

a. Spear phishing
b. Whaling
c. Clone phishing
d. Denial-of-service attack
e. Man-in-the-middle attack

4. Which of the following is NOT a way to protect yourself from ransomware?

a. Back up your data regularly.


b. Keep your software up to date.
c. Be careful about what links you click on and what attachments you open in
emails and text messages.
d. Pay the ransom.
e. Report ransomware attacks to the authorities.

5. Which of the following is NOT a challenge of investigating and prosecuting


cybercrime?

a. Cybercrime is often difficult to prove in a court of law.


b. Cybercriminals are often located in foreign countries where it is difficult to
extradite them.
c. Digital evidence can be easily destroyed or tampered with.
d. Law enforcement agencies often lack the resources and expertise to
investigate cybercrime effectively.
CYS 26371 Fall 2023 HW#1

e. Cybercrime is a constantly evolving threat.

do
6. Which of the following is NOT a way that cybercriminals can steal your identity?
as
a. Phishing attacks
b. Physical theft
c. Malware attacks
d. Data breaches
e. Social engineering attacks

g
7. Which of the following is NOT a type of cyberespionage attack?

a. Waterhole attack
b. Supply chain attack
c. Spear phishing attack
d. Denial-of-service attack
e. Man-in-the-middle attack

8. Which of the following is NOT a way that governments and businesses can protect
themselves from cybercrime?

a. Implement a cybersecurity policy.


b. Train employees on cybersecurity awareness.
c. Use firewalls and intrusion detection systems.
d. Back up data regularly.
e. Pay cybercriminals to not attack them.

O
9. Which of the following is NOT a new and emerging cybercrime threat?

a. Deepfakes
b. Quantum computing
c. Artificial intelligence
d. Ransomware-as-a-service
e. All of the above are new and emerging cybercrime threats.

10. Which of the following is NOT a way


IIEto create a more secure internet?
a. Educate the public about cybercrime.
b. Develop and implement new security technologies.
c. Increase cooperation between law enforcement agencies in different
countries.
d. Censor the internet.
e. All of the above are ways to create a more secure internet.
CYS 26371 Fall 2023 HW#1

Question 4: What are some of the ways that you can protect yourself from cybercrime?
(Short answer)
[2 Marks]

There are many ways to protect my data, but the most popular is to use a strong and different
password for all my accounts, to constantly update the software, to redeem it, to back up my
data, to be aware of new attacks.

You might also like