Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please answer all questions Question 4 What does data Availability refers to ? Not yet answered O a. Access to information Marked out of 1.00

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

Please answer all questions

Question 4 What does data Availability refers to ? Not yet answered O a. Access to information Marked out of 1.00 O b. Integrity Flag question O c. Accuracy O d. Privacy Question 5 Not yet answered Hackers who break into system with permission to discover weaknesses are called as O a. Blue Hats Narked out of 160 O b. Grey Cats Fag question O c Black Hats Od. White Cats Question 6 Naty is used to steal data bypass access controls cause harm to our compromise a system Marked out of 1.00 Flag question Select one: a. Hardware b. Software Malware d. Skyware on 10 A type of malware that track and spy on the user is called as red d out of O a. Adware g question O b. Scareware O c. Ransomeware O d. Spyware stion 11 Preventing the loss of irreplaceable data can be achieved by ked out of Select one O a. Backup of data Flag question O b. Providing a password O c Authentication O d. Hacking estion 12 Which one of the following options will protect our computing devices O a. Install some games arted out of Use Antivirus and Antispyware Fag question c. Switch-off your devices Od. Do not tum on your device A type of malware that carries out malicious operations under the guise of a desired operation is 3 ed I out of Select one: O a. Virus question O b. Worm O c. Rootkit O d. Trojan horse on 8 Data that is written beyond the limits of a buffer is known as Select one O a. Trojan Horse 9 question O b. Rootkits Oc Buffer Overflow O d. Worm on 9 Which one of the following is a symptoms of Malware a. Memory is not used ed out of o b. There are unknown processes running Eng question OCPU speed is very high d. Increase in Web browsing speed Question 13 Which of the following passphrase is the most secure? Not yet answered O a. Acat th@tlov3sdogs Marked out of 1.00 O b. myfirstschool Flag question O c. Thisismypassphrase O d. Acatthatlovesdogs Question 14 NSC stands for Not yet answered Marked out of 1.00 Select one: O a National Security Conciliation Flag question O b. Native Security Council O c. National Safety Council O d. National Security Council Dertion 15 Not ye Any person who uses the informational network on the information technology facilities is considere Crime answered Manted out of 1.00 O a. Trespass on Credit Cards Flag question Ob Fargery Oc Content d. Violation of confidentiality of data Which of the following is likely to be part of a person's social media identity? of O a. music estion O b. an avatar O c. movie O d.games 2. Identity that interacts on a regular basis at home is called identity: ed O a linked out of Ob. Networked question c Online d. Offline on 3 An individual who commits illegal activities using computers and the Internet is called yet a. Cyber Enabled od out of ob Cyber Report Flag question Oc Cyber Dependant Od. Cyber Criminal

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

How Do I Use A Database Research Tools You Can Use

Authors: Laura La Bella

1st Edition

1622753763, 978-1622753765

More Books

Students also viewed these Databases questions

Question

5. Describe how contexts affect listening

Answered: 1 week ago