1 |
Using computer for the purpose of some unauthorized activities is called: |
- A. Fraud or misuse
- B. Selling and printing
- C. Denial of service
- D. Piracy
|
2 |
Which is installing more copies of the software than you have license for ? |
- A. Internet cyber text
- B. Cyber
- C. Client server oversue
- D. Online piracy
|
3 |
Which is a cyber attack to make machine or network resource unavailable for a user ? |
- A. Softlifting
- B. Liability
- C. Denial of service
- D. Online piracy
|
4 |
Which means that we want to keep the data correct ? |
- A. Integrity
- B. Cyber
- C. Client server overuse
- D. Online piracy
|
5 |
Cryptographic keys are used to read an ________ message: |
- A. Double
- B. Right
- C. Center
- D. Encrypted
|
6 |
Which of the following is not a cybercrime ? |
- A. Hacking
- B. Phishing crime
- C. Identity Theft
- D. Decryption
|
7 |
Which of the following is not characteristics of phishing website ? |
- A. Similar domain of actual website
- B. Using of forms to collect visitors
- C. Actual link to web account
- D. Email account updates
|
8 |
Every organization to whom the data is entrusted, it is their responsibility regarding ___________ of the data: |
- A. Confidentiality
- B. Privacy
- C. Online privacy
- D. Confidentiality and privacy
|
9 |
Encoding means conversion of the data to an unreadable format which is called: |
- A. Ciphertext
- B. Online banking
- C. Client
- D. Encryption
|
10 |
A _________ is a computer program written with negative intentions: |
- A. Patent
- B. Virus
- C. Client
- D. Software piracy
|