spot_img

IIBF – CYBER CRIME & FRAUD MANAGEMENT MOCK TEST 2022

IIBF – CYBER CRIME & FRAUD MANAGEMENT MOCK TEST 2022

CYBER CRIME MOCK TEST:- As there is almost no time left for the Certificate exam in Prevention of Cyber Crime & Fraud Management, we hope that the candidates preparing for this IIBF Exam have done with their revisions of the paper! (The exams dates are 14-05-2022 & 28-05-2022 for this year)

If you are preparing for the exams & need material to quickly revise the topics of Cyber Crime or do the last-minute revision of the paper then you must check out the Cyber Crime Question Bank that is available on our website. You can check the question bank out by hitting this link. (Check out the ‘Prevention Of Cyber Crimes & Fraud Management Mock Tests’ in the BuyPro Section)

We always try to ensure that whoever comes looking for any material or content on any exam of IIBF receives the best & right material so that the preparation can be done well. Below is the Mock Test on Cyber Crime for you to solve. Solve the test sincerely and refrain to cheat. 

You can even download the pdf file of the below mock test from the link given at the last of this article.

Important Topic:- IIBF CYBER CRIMES EXAM RECOLLECTED QUESTIONS FOR 2022

Solve the given mock test of Cyber Crime within 15 Minutes & then, can check your answers from the answer key provided at the last of this article!!

CYBER CRIME FREE MOCK TEST

No. QUESTION
1 Which of the following is an example of physical hacking?

a) Remote Unauthorised access

b) Inserting USB loaded with malware to a system

c) DDoS i.e Distributed Denial of Service attack

d) None of the above hacks

2 What is defined as a set of software-based systems or hardware devices which controls the permission or denial of the access to a network resource based on a set of rules framed for the said purpose?

a) Firewall

b) Authentication

c) Privilege Access

d) None of the above options

3 Which of the following is the hacker groups?

a) They work anonymously & create tools for hacking & hacking the computers for non-criminal reasons and are even sometimes hired by companies wanting to test their security

b) They work mostly within the organization & might only be 20% of the threat, but they do produce 80% of the damage

c) They are responsible for highly targeted attacks that are carried out by extremely organized state-sponsored groups, having sound technical skills

d) They keep sending mails of offering trade discounts and some other offers

4 What is included in Data theft?

a. It means an unauthorized attempt to bypass the mechanisms of security of an information system or a network.

b. It is the use of information and communication technologies to support hostile behavior

c. It is a form of fraud or use of the identity of another person 

d. It means to download or copy without the permission of the person who is in charge of the computer, or the extraction of any data, computer database or information from computer.

5 What does Cyberstalking mean?

a) Cyber pornography

b) Computer fraud

c) Computer virus

d) Harassing someone through electronic medium

6 Which of the below options is used for deceiving or cheating a person with the help of a computer device or mobile & is punishable as per the IPC as well as under the I.T. Act, 2002?

a) Cyber cheating

b) Cyber warfare

c) Cyber Terrorism

d) Cyber extortion

7 What are the special programs types that are used for recording & tracking user’s keystroke?

a) Keylogger

b) Trojans

c) Virus

d) Worms

8 Which of the following is the practice is used for gathering sensitive information through the implementation of technology to spy someone?

a) Digital Spying

b) Cyber-spy

c) Cyber espionage

d) Spyware

9 What of the following is an attempt to steal, damage, spy, or destroy the computer systems or networks or their associated information?

a) Cyber terrorist

b) Digital hacking

c) Cyber attack

d) Cyber security

10 Which of the below options’ help Phishing can be prevented?

a) One time password (OTP)

b) Two-factor authentication

c) Both the above options

d) None of the above options

11 The concerted efforts of a person(s) to prevent a website or service from functioning efficiently is called as what of the following?

a) Ransomware

b) Malware

c) Denial of service attack

d) Phishing

12 Which is the Special computer programmes that enable the intruders to fool individuals into believing that traditional security is protecting them during banking transactions that happen during online?

a) Ransomware

b) Malware

c) Whaling

d) Phishing

13 Which of the below is a scenario through which the information is accessed without authorization?

a) Compromise of Information

b) Breach of Data 

c) Data copying

d) Hack of Data 

14 An attempt to access to a network system using an employee’s credentials is done through what mode of ethical hacking?

a) Local Networking

b) Social Engineering

c) Physical Entry

d) Remote Networking

15 Which from the following network securities try to enter the system by cracking the password by repeated attempts that are often system driven?

a) Session hijacking

b) Trojan horse

c) Brute force attack

d) Rootkit

Important Topic:- Cyber Crimes and Fraud Management – SYLLABUS 

ANSWER KEY
1 b 9 c
2 a 10 c
3 a 11 c
4 d 12 b
5 d 13 b
6 a 14 a
7 a 15 c
8 c

 

You can download the PDF file of the above given Mock Test on Cyber Crime by hitting here.

You can find other mock tests available on the IIBF Prevention of Cyber Crime & Fraud Management Exam on our website & you can even attempt them online. There are a total of 2 Free Mock Tests you can attempt when you sign up @iibf.info

All the very best for your Cyber Crime Exam!!!

May you do well in the upcoming exam.

Also Like:

LEAVE A REPLY

Please enter your comment!
Please enter your name here

🤩 🥳 LS NEW OFFER 🥳 🤩spot_img
🤩 🥳 JAIIB NEW BATCH START 🥳 🤩spot_img

POPULAR POST

RELATED ARTICLES

HOME LOANS | RETAIL ASSET PRODUCTS | CAIIB RETAIL BANKING

RETAIL ASSET PRODUCTS: HOME LOANS | CAIIB RETAIL BANKING MODULE B & UNIT 4 Free short notes on Retail Asset Products i.e Home Loans from...

CAIIB EXAM 2022 | 7 DAYS STRATEGY TO PASS CAIIB (ABM, BFM, RETAIL BANKING) IN FIRST ATTEMPT

IIBF CAIIB 7 DAY STRATEGY | PASS CAIIB – ABM, BFM & RETAIL BANKING 2022 IN THE FIRST ATTEMPT If you are here looking for...

CHANGING JAIIB EXAM CENTRE FOR NOVEMBER JAIIB 2022 PAPERS

WANT TO CHANGE JAIIB EXAM CENTRE FOR NOVEMBER JAIIB 2022 EXAM? The procedure & the requirements of changing JAIIB Exam Centre for JAIIB Examinations to...

CAIIB ABM EXAM 2022 | 7 DAYS STRATEGY TO PASS CAIIB 2022 IN ONE ATTEMPT

7 DAYS STRATEGY TO PASS CAIIB ABM EXAM 2022 In this article, candidates preparing for CAIIB ABM Exam 2022 will know what exactly they need...