What is Secure Socket Layer (SSL)?
A. two-factor authentication
B. illegal access to a computer system
C. malicious software
D. a method of encryption *
E. antivirus software
Two-factor authentication include next independent forms of identification as
A. your name and an email adress
B. your name and a password or PIN number*
C. your loginand a password
D. your account and ip adress
E. your sername and fullname
Who are Hackers?
A. are people who serves your computer system
B. are people who protects your computer system
C. are people who is troubleshooing in your computer system
D. are people who try to gain illegal access to a computer system*
E. a branch of computer security specifically related to the internet
Cyber security is
A. a method of encryption information in computer system
B. illegal access to a computer system
C. a branch of computer security specifically related to the internet *
D. method of Hackers, which hack codes in a computer system
E. the type of services a computer system
Hacking, denial of service attack, virus dissemination, computer vandalism are types of
A. Cyber Terrorism
B. Software Piracy
C. Cyber Crime *
D. Antivirus softwares
E. Cyber security
A cyber criminal is a
A. are people who protects your computer system
B. are people who is troubleshooing in your computer system
C. are people who try to gain illegal access to a computer system
D. a branch of computer security specifically related to the internet
E. person who uses computers and the Internet to commit crimes*
Cyber Sapiens is
A. A prefix that indicates relevance to, or involvement with, computers, computer systems, and electronic control systems
B. The study of control system theory in terms of the relationship between animal and machine behavior
C. An expression for a computer or robot with artificial intelligence (AI) on the forefront of current technology*
D. The usage of computers and the Internet in conducting warfare in the cyberspace
E. A kind of cyber attack which results in unavailability of service.
The usage of computers and the Internet in conducting warfare in the cyberspace is
A. Cyber vandalism
B. Cyber war*
C. Hacktivism
D. Denial of Service
E. Cybernetics
Cyber vandalism is
A. Combination of words: “hack(er)” and “activism”
B. A kind of cyber attack which results in unavailability of service
|
|
C. Cyber attacks that deface web pages*
D. Denial of Service
E. Alternative expression for information super highway
What is Identity Theft?
A. software false negative, false positive, rootkit, security software, capabilities sweep, virus removal software, web page analysis
B. anti-virus software, backup, block, cyber criminal, detect
C. attack, audit log, authenticated, backdoor, bug, firewall, Checking Measures intruder, keylogger, popup, protocol, security certainty
D. card scanning, cyber, fraud, harming, identity theft, Discussing malware, phishing, pretexting, scanner, spyware, suspicions Trojan horse, worm*
E. overwriting virus, piggybacking, replicate, resident possible
Preventative Email is virus which
A. software false negative, false positive, rootkit, security software, capabilities sweep, virus removal software, web page analysis
B. anti-virus software, backup, block, cyber criminal, detect
C. attack, audit log, authenticated, backdoor, bug, firewall, Checking Measures intruder, keylogger, popup, protocol, security certainty*
D. card scanning, cyber, fraud, harming, identity theft, Discussing malware, phishing, pretexting, scanner, spyware, suspicions Trojan horse, worm
E. overwriting virus, piggybacking, replicate, resident possible
Cloud computing
Model consists of the particular types of services that you can access on a cloud computing platform.
A. Service*
B. Deployment
C. Application
D. Depatment
E. None of the mentioned
252. Point out the correct statement:
A. The use of the word “cloud” makes reference to the two essential concepts
B. Cloud computing abstracts systems by pooling and sharing resources*
C. Cloud computing is nothing more than the Internet
D. Model consists of the particular types of services that you can access on a cloud computing platform
E. All of the mentioned
Дата добавления: 2019-02-22; просмотров: 948; Мы поможем в написании вашей работы! |
Мы поможем в написании ваших работ!