1 |
Making illegal copies of software is called: |
- A. Stolen
- B. Phishing crime
- C. Identity Theft
- D. Piracy
|
2 |
Which means that we want to keep the data correct ? |
- A. Integrity
- B. Cyber
- C. Client server overuse
- D. Online piracy
|
3 |
Which is installing more copies of the software than you have license for ? |
- A. Internet cyber text
- B. Cyber
- C. Client server oversue
- D. Online piracy
|
4 |
In which method, we replace each alphabet in the plaintext by another alphabet: |
- A. Integrity
- B. Cyber
- C. Ceaser Cipher
- D. Privacy
|
5 |
Which are usually the secrets that are playing an important role for the success of a company ? |
- A. Trade secrets
- B. Cyber
- C. Client server overuse
- D. Online piracy
|
6 |
Encoding means conversion of the data to an unreadable format which is called: |
- A. Ciphertext
- B. Online banking
- C. Client
- D. Encryption
|
7 |
Companies want to read minds of Web surfers and sometimes they store some piece of information with the Web surfer, called: |
- A. Integrity
- B. Cyber
- C. Cookies
- D. Online piracy
|
8 |
Which attackers often target web server of high-profile organizations such as banking, commerce, and media companies, or government and trade organizations ? |
- A. Service
- B. DoS
- C. Client
- D. Substitution Cipher
|
9 |
A computer expert who can steal data when it moves from on location to other, is called: |
- A. Hacker
- B. Sabotaged
- C. Passwords
- D. Decryption
|
10 |
A crime in which computer network or devices are used is called a: |
- A. Lefting
- B. Phishing crime
- C. Identity Theft
- D. Cybercrime
|