Filters
Question type

Study Flashcards

What are the 4 key aspects critical to the handling of digital evidence?


A) Repeatability, auditability, confidentiality and integrity
B) Auditability, repeatability, reproducibility and justifiability
C) Reproducibility, justifiability, police cyber security measures and integrity
D) Justifiability, police cyber security measures, confidentiality and reproducibility

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

What is the primary method by which cyber-crime exploits are begun?


A) By phone call
B) By E-mail
C) By hacking
D) By post

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

B

Which of the following best defines the term 'cyber-crime'?


A) Types of crime associated with the use of information technology systems and computers that are not connected to the Internet
B) Types of crime committed via the Internet, by someone/a group of people in another country other than the one in which the victim(s) experience the crime
C) Types of crime associated with the use of computers, the Internet, or information technology systems
D) Types of crime associated with new technologies

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

C

What are 'Cyber Threat Actors'?


A) Those who are skilled at computer programming
B) Those who monitor cyber-threats
C) Those who perpetrate cyber-crime
D) Those who monitor threatening language on social media

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

What is ransomware?


A) Software that makes a device unusable or data inaccessible until a 'ransom' has been paid
B) A type of virtual private network
C) Software used for sending out large scale amounts of phishing emails
D) An anti-virus software

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Why does cyber-crime often increase in times of confusion or global events?


A) Times of confusion or global events make people more likely to become CTAs
B) Cyber security is less effective during such times
C) CTAs are better able to exploit human vulnerabilities during such times
D) There is easier digital access during such times

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

C

The CIA triad is a useful model to assist in how one should think about an individuals' information security. What three things to consider make up the CIA triad?


A) Security, Confidentiality and Integrity
B) Confidentiality, Integrity and Availability
C) Confidentiality, Availability and Security
D) Integrity, Security and Availability

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

In the context of cyber-crime, what are 'Advanced Persistent Threats' (APTs) ?


A) Well-financed and resourced cyber threat actors who specialise in fraud
B) Well-financed and resourced cyber-criminal groups who continuously target companies or government agencies
C) Cyber threat actors who are career criminals
D) Well-financed and resourced cyber-criminal groups who create ransomware

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Which of the following is NOT and the major issue surrounding the attribution of cyber-crime?


A) The use of VPNs or proxy servers
B) Cyber-crime may be transnational
C) A high confidence level is required when attempting to make attribution of cyber-crime
D) Public police agencies don't have the technology or ability to find IP addresses

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Which of the following would NOT be considered an example of cyber-crime?


A) Stealing a phone with the intent to immediately sell it on
B) Accessing a device without the owner's consent
C) Introducing malware onto a device
D) Illicit drug dealing in which the use of the internet is involved

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Showing 1 - 10 of 10

Related Exams

Show Answer