A) Repeatability, auditability, confidentiality and integrity
B) Auditability, repeatability, reproducibility and justifiability
C) Reproducibility, justifiability, police cyber security measures and integrity
D) Justifiability, police cyber security measures, confidentiality and reproducibility
Correct Answer
verified
Multiple Choice
A) By phone call
B) By E-mail
C) By hacking
D) By post
Correct Answer
verified
Multiple Choice
A) Types of crime associated with the use of information technology systems and computers that are not connected to the Internet
B) Types of crime committed via the Internet, by someone/a group of people in another country other than the one in which the victim(s) experience the crime
C) Types of crime associated with the use of computers, the Internet, or information technology systems
D) Types of crime associated with new technologies
Correct Answer
verified
Multiple Choice
A) Those who are skilled at computer programming
B) Those who monitor cyber-threats
C) Those who perpetrate cyber-crime
D) Those who monitor threatening language on social media
Correct Answer
verified
Multiple Choice
A) Software that makes a device unusable or data inaccessible until a 'ransom' has been paid
B) A type of virtual private network
C) Software used for sending out large scale amounts of phishing emails
D) An anti-virus software
Correct Answer
verified
Multiple Choice
A) Times of confusion or global events make people more likely to become CTAs
B) Cyber security is less effective during such times
C) CTAs are better able to exploit human vulnerabilities during such times
D) There is easier digital access during such times
Correct Answer
verified
Multiple Choice
A) Security, Confidentiality and Integrity
B) Confidentiality, Integrity and Availability
C) Confidentiality, Availability and Security
D) Integrity, Security and Availability
Correct Answer
verified
Multiple Choice
A) Well-financed and resourced cyber threat actors who specialise in fraud
B) Well-financed and resourced cyber-criminal groups who continuously target companies or government agencies
C) Cyber threat actors who are career criminals
D) Well-financed and resourced cyber-criminal groups who create ransomware
Correct Answer
verified
Multiple Choice
A) The use of VPNs or proxy servers
B) Cyber-crime may be transnational
C) A high confidence level is required when attempting to make attribution of cyber-crime
D) Public police agencies don't have the technology or ability to find IP addresses
Correct Answer
verified
Multiple Choice
A) Stealing a phone with the intent to immediately sell it on
B) Accessing a device without the owner's consent
C) Introducing malware onto a device
D) Illicit drug dealing in which the use of the internet is involved
Correct Answer
verified
Showing 1 - 10 of 10
Related Exams