Protecting computes and information they contain against unwanted access, damage, modification, or destruction is called………
a) computer monitoring
b) electronic policing
c) audit control
d) computer security
Restricted access to server computer control room is a form of…….
a) logical security
b) enterprise security
c) physical security
d) user security
The measurement of things such as fingerprints and retinal scans used for security is called……
a) biometric
b) bio measurement
c) computer security
d) smart weapon machinery
Which of the following is not a bio-metric technique?
a) badge
b) retina
c) palm print
Which of the following is the most devastating loss to a company?
a) loss of hardware
b) loss of data
c) loss of software
d) loss of printouts
How many types of backups?
a) one
b) two
c) three
d) four
complete backup, Incremental backup