Contents

Protecting computes and information they contain against unwanted access, damage, modification, or destruction is called………
a) computer monitoring    
b) electronic policing
c) audit control    
d) 
computer security


d

Restricted access to server computer control room is a form of…….
a) logical security
b) enterprise security
c) physical security
d) user security


c

The measurement of things such as fingerprints and retinal scans used for security is called……
a) biometric                        
b) bio measurement
c) computer security                          
d) smart weapon machinery


a

Which of the following is not a bio-metric technique?
a) badge               
b) retina
c) palm print


c

Which of the following is the most devastating loss to a company?
a) loss of hardware             
b) loss of data
c) loss of software              
d) loss of printouts


b

How many types of backups?
a) one    
b) two    
c) three  
d) four

b

complete backup, Incremental backup