spot_img

IIBF – CYBER CRIME & FRAUD MANAGEMENT MOCK TEST 2024

IIBF – CYBER CRIME & FRAUD MANAGEMENT MOCK TEST 2024

CYBER CRIME MOCK TEST:- As there is almost no time left for the Certificate exam in Prevention of Cyber Crime & Fraud Management, we hope that the candidates preparing for this IIBF Exam have done with their revisions of the paper!

If you are preparing for the exams & need material to quickly revise the topics of Cyber Crime or do the last-minute revision of the paper then you must check out the Cyber Crime Question Bank that is available on our website. You can check the question bank out by hitting this link. (Check out the ‘Prevention Of Cyber Crimes & Fraud Management Mock Tests’ in the BuyPro Section)

We always try to ensure that whoever comes looking for any material or content on any exam of IIBF receives the best & right material so that the preparation can be done well. Below is the Mock Test on Cyber Crime for you to solve. Solve the test sincerely and refrain to cheat. 

You can even download the pdf file of the below mock test from the link given at the last of this article.

Important Topic:- IIBF CYBER CRIMES EXAM RECOLLECTED QUESTIONS

Solve the given mock test of Cyber Crime within 15 Minutes & then, can check your answers from the answer key provided at the last of this article!!

CYBER CRIME-FREE MOCK TEST

No. QUESTION
1 Which of the following is an example of physical hacking?

a) Remote Unauthorised access

b) Inserting a USB loaded with malware into a system

c) DDoS i.e Distributed Denial of Service attack

d) None of the above hacks

2 What is defined as a set of software-based systems or hardware devices which controls the permission or denial of access to a network resource based on a set of rules framed for the said purpose?

a) Firewall

b) Authentication

c) Privilege Access

d) None of the above options

3 Which of the following is the hacker group?

a) They work anonymously & create tools for hacking & hacking the computers for non-criminal reasons and are even sometimes hired by companies wanting to test their security

b) They work mostly within the organization & might only be 20% of the threat, but they do produce 80% of the damage

c) They are responsible for highly targeted attacks that are carried out by extremely organized state-sponsored groups, having sound technical skills

d) They keep sending emails of offering trade discounts and some other offers

4 What is included in Data theft?

a. It means an unauthorized attempt to bypass the mechanisms of security of an information system or a network.

b. It is the use of information and communication technologies to support hostile behaviour

c. It is a form of fraud or use of the identity of another person 

d. It means to download or copy without the permission of the person who is in charge of the computer, or the extraction of any data, computer database or information from the computer.

5 What does Cyberstalking mean?

a) Cyber Pornography

b) Computer fraud

c) Computer virus

d) Harassing someone through an electronic medium

6 Which of the below options is used for deceiving or cheating a person with the help of a computer device or mobile & is punishable as per the IPC as well as under the I.T. Act, 2002?

a) Cyber cheating

b) Cyberwarfare

c) Cyber Terrorism

d) Cyber extortion

7 What are the special programs types that are used for recording & tracking users’ keystrokes?

a) Keylogger

b) Trojans

c) Virus

d) Worms

8 Which of the following is the practice is used for gathering sensitive information through the implementation of technology to spy on someone?

a) Digital Spying

b) Cyber-spy

c) Cyber espionage

d) Spyware

9 What of the following is an attempt to steal, damage, spy, or destroy computer systems or networks or their associated information?

a) Cyber terrorist

b) Digital hacking

c) Cyberattack

d) Cyber security

10 Which of the below options helps Phishing can be prevented?

a) One-time password (OTP)

b) Two-factor authentication

c) Both the above options

d) None of the above options

11 The concerted efforts of a person(s) to prevent a website or service from functioning efficiently is called what of the following?

a) Ransomware

b) Malware

c) Denial of service attack

d) Phishing

12 Which are the Special computer programmes that enable intruders to fool individuals into believing that traditional security is protecting them during banking transactions that happen online?

a) Ransomware

b) Malware

c) Whaling

d) Phishing

13 Which of the below is a scenario through which the information is accessed without an authorization?

a) Compromise of Information

b) Breach of Data 

c) Data copying

d) Hack of Data 

14 An attempt to access a network system using an employee’s credentials is done through what mode of ethical hacking?

a) Local Networking

b) Social Engineering

c) Physical Entry

d) Remote Networking

15 Which of the following network securities try to enter the system by cracking the password through repeated attempts that are often system driven?

a) Session hijacking

b) Trojan horse

c) Brute force attack

d) Rootkit

Important Topic:- Cyber Crimes and Fraud Management – SYLLABUS 

ANSWER KEY
1 b 9 c
2 a 10 c
3 a 11 c
4 d 12 b
5 d 13 b
6 a 14 a
7 a 15 c
8 c

 

READ ALSO: COACHING CLASSES FOR PREVENTION OF CYBER CRIMES AND FRAUD MANAGEMENT

You can download the PDF file of the above given Mock Test on Cyber Crime by hitting here.

You can find other mock tests available on the IIBF Prevention of Cyber Crime & Fraud Management Exam on our website & you can even attempt them online. There are a total of 2 Free Mock Tests you can attempt when you sign up at @iibf.info

All the very best for your Cyber Crime Exam!!!

May you do well in the upcoming exam?

Also Like:

LEAVE A REPLY

Please enter your comment!
Please enter your name here

🤩 🥳 JAIIB NEW BATCH START 🥳 🤩spot_img
🤩 🥳 JAIIB CAIIB CLASSES 🥳 🤩spot_img

POPULAR POSTS

RELATED ARTICLES

Continue to the category

ABFM 2024 Live Classes by Ashish Sir PDF Files

ABFM CLASS #1 https://youtube.com/live/c-hbL_xgvvE?feature=share Download PDF: abfm by ashish #2 ABFM CLASS #2 by Ashish Sir Dated 02.12.2024 https://youtube.com/live/xUQnQLS4Hng?feature=share Download PDF: abfm by ashish sir #1

BFM in 15 Days: Day 2 Video and PDF

I hope that you must have gone through the first part of the bank financial management in 15 days series. And if you have...

CAIIB BFM most expected concepts – Ashish Sir

Bank financial management is a second exam and the compulsory exam in CAIIB. If you are preparing for BFM, then you must be reading...

HRM 2024 NEW MODULE E | EMERGING SCENARIO IN HRM | HUMAN RESOURCE MANAGEMENT LATEST SYLLABUS

HRM NEW SYLLABUS MODULE E ADDED | CAIIB ELECTIVE HUMAN RESOURCE MANAGEMENT In this post, we will be taking a brief look at Module E...