Cyber Crime - Week 1 Quiz Solved 2025
________ consist of rules that define network security policies and governs the rights
and privileges of users of a specific system. - Answers-Access control lists
________ is used to authenticate evidence. - Answers-Chain of Custody
An email address includes the: - Answers-Username and domain
Hacking occurs when an individual ________________. - Answers-gains unauthorized
access to a system.
The _______ field reveals the real IP address of the computer from which the email was
originally sent from. - Answers-X-Originating IP
The ___________ states that forensic tools, techniques, procedures, and evidence are
admissible in court only if they have a "general acceptance" within the scientific
community. - Answers-Frye Standard
To be considered a cybercrime, computers must be - Answers-The target of the crime
The tool used to commit the crime
Which of the following crimes would not have been possible without the use of computer
technology and the Internet: - Answers-Hacking
Malware
Which of the following describes cyber crime: - Answers-it helps perpetrators expend
less effort than committing traditional crime.
it is committed on a far broader scale than traditional crime
Which of the following is malware? - Answers-Spyware, Viruses
________ consist of rules that define network security policies and governs the rights
and privileges of users of a specific system. - Answers-Access control lists
________ is used to authenticate evidence. - Answers-Chain of Custody
An email address includes the: - Answers-Username and domain
Hacking occurs when an individual ________________. - Answers-gains unauthorized
access to a system.
The _______ field reveals the real IP address of the computer from which the email was
originally sent from. - Answers-X-Originating IP
The ___________ states that forensic tools, techniques, procedures, and evidence are
admissible in court only if they have a "general acceptance" within the scientific
community. - Answers-Frye Standard
To be considered a cybercrime, computers must be - Answers-The target of the crime
The tool used to commit the crime
Which of the following crimes would not have been possible without the use of computer
technology and the Internet: - Answers-Hacking
Malware
Which of the following describes cyber crime: - Answers-it helps perpetrators expend
less effort than committing traditional crime.
it is committed on a far broader scale than traditional crime
Which of the following is malware? - Answers-Spyware, Viruses