1 |
A computer expert who can steal data when it moves from on location to other, is called: |
- A. Hacker
- B. Sabotaged
- C. Passwords
- D. Decryption
|
2 |
Companies want to read minds of Web surfers and sometimes they store some piece of information with the Web surfer, called: |
- A. Integrity
- B. Cyber
- C. Cookies
- D. Online piracy
|
3 |
To protect value and usefulness we may imply: |
- A. Trade secrets
- B. Cyber
- C. Client server overuse
- D. Online piracy
|
4 |
Which is the process of encoding data ? |
- A. Service
- B. Online banking
- C. Client
- D. Encryption
|
5 |
Some malicious user disguises himself as our friend and tries to get some confidential information: |
- A. Lefting
- B. Phishing
- C. Identity Theft
- D. Online piracy
|
6 |
CAPTCHA stands for: |
- A. Completely Automated Public Turning
- B. Completely Automated
- C. Automated Public Turning
- D. Automated
|
7 |
The computer can be attacked while sitting remotely, in this way sensitive information will be: |
- A. Hacking
- B. Sabotaged
- C. Identity Theft
- D. Decryption
|
8 |
Which is called borrowing and installing a copy of a software application form a colleague ? |
- A. <sub>Softlifting</sub>
- B. Liability
- C. Denial of service
- D. Online piracy
|
9 |
Vigenere Cipher is another substitution cipher, which uses a table known as: |
- A. Vigenere Cipher table
- B. Simple table
- C. Complex table
- D. Round table
|
10 |
When a key has less number of character than the text to the encrypt, then repeating letters of the key is called: |
- A. Interim ciphertext
- B. Cyber
- C. Client server oversue
- D. Online piracy
|