1 |
Vigenere Cipher is another substitution cipher, which uses a table known as: |
- A. Vigenere Cipher table
- B. Simple table
- C. Complex table
- D. Round table
|
2 |
CAPTCHA stands for: |
- A. Completely Automated Public Turning
- B. Completely Automated
- C. Automated Public Turning
- D. Automated
|
3 |
Which is a way to protect an idea ? |
- A. Patent
- B. Online banking
- C. Client
- D. Software piracy
|
4 |
Which of the following is not a characteristic of good password ? |
- A. Is eight characters long
- B. Doesn't contain username
- C. Contains uppercase letters
- D. Password is your name only
|
5 |
In this method, we have a substitution key that is combined with the plaintext to generate the ciphertext: |
- A. Vigenere Cipher method
- B. Simple method
- C. Complexmethod
- D. Roundmethod
|
6 |
Which is called duplicating and selling copyrighted programs ? |
- A. Service
- B. Counterfeiting
- C. Client
- D. Encryption
|
7 |
Every organization to whom the data is entrusted, it is their responsibility regarding ___________ of the data: |
- A. Confidentiality
- B. Privacy
- C. Online privacy
- D. Confidentiality and privacy
|
8 |
Which of the following doesn't includes the types of software piracy ? |
- A. Softlifting
- B. Liability
- C. Client server oversue
- D. Online piracy
|
9 |
Making illegal copies of software is called: |
- A. Stolen
- B. Phishing crime
- C. Identity Theft
- D. Piracy
|
10 |
Illegally accessing someone else's computer is called: |
- A. Hacking
- B. Sabotaged
- C. Passwords
- D. Decryption
|