1 |
Which is the process of encoding data in such a way that only authorized person can read it ? |
- A. Service
- B. Counterfeiting
- C. Client
- D. Encryption
|
2 |
A computer expert who can steal data when it moves from on location to other, is called: |
- A. Hacker
- B. Sabotaged
- C. Passwords
- D. Decryption
|
3 |
A crime in which computer network or devices are used is called a: |
- A. Lefting
- B. Phishing crime
- C. Identity Theft
- D. Cybercrime
|
4 |
Illegally accessing someone else's computer is called: |
- A. Hacking
- B. Sabotaged
- C. Passwords
- D. Decryption
|
5 |
Companies want to read minds of Web surfers and sometimes they store some piece of information with the Web surfer, called: |
- A. Integrity
- B. Cyber
- C. Cookies
- D. Online piracy
|
6 |
CAPTCHA stands for: |
- A. Completely Automated Public Turning
- B. Completely Automated
- C. Automated Public Turning
- D. Automated
|
7 |
Which of the following is not characteristics of phishing website ? |
- A. Similar domain of actual website
- B. Using of forms to collect visitors
- C. Actual link to web account
- D. Email account updates
|
8 |
The computer can be attacked while sitting remotely, in this way sensitive information will be: |
- A. Hacking
- B. Sabotaged
- C. Identity Theft
- D. Decryption
|
9 |
Promises made by a software developer is known as warranty or: |
- A. Confidentiality
- B. Service
- C. Liability
- D. Loading
|
10 |
Which of the following is not a cybercrime ? |
- A. Hacking
- B. Phishing crime
- C. Identity Theft
- D. Decryption
|