1 |
Which is installing more copies of the software than you have license for ? |
- A. Internet cyber text
- B. Cyber
- C. Client server oversue
- D. Online piracy
|
2 |
Which of the following is not the characteristics of phishing emails ? |
- A. Official data breach notification
- B. Email account update
- C. IT remainder
- D. Similar domain of actual website
|
3 |
Which means that we want to have access to the data when we want ? |
- A. Patent
- B. Availibility
- C. Client
- D. Software piracy
|
4 |
Typically involves downloading illegal software: |
- A. Lefting
- B. Phishing crime
- C. Identity Theft
- D. Online piracy
|
5 |
Ceaser was a Roman politician and military general who played a critical role in the rise of the: |
- A. Asia Empire
- B. Roman Empire
- C. American Empire
- D. Pakistan Empire
|
6 |
Which means that we want to keep the data correct ? |
- A. Integrity
- B. Cyber
- C. Client server overuse
- D. Online piracy
|
7 |
Every organization to whom the data is entrusted, it is their responsibility regarding ___________ of the data: |
- A. Confidentiality
- B. Privacy
- C. Online privacy
- D. Confidentiality and privacy
|
8 |
Which is the illegal copying, distribution, or usage of software ? |
- A. Service
- B. Online banking
- C. Client
- D. Software piracy
|
9 |
Vigenere Cipher is another substitution cipher, which uses a table known as: |
- A. Vigenere Cipher table
- B. Simple table
- C. Complex table
- D. Round table
|
10 |
Illegally accessing someone else's computer is called: |
- A. Hacking
- B. Sabotaged
- C. Passwords
- D. Decryption
|