Which of the following is example of real security and privacy threats?
a) hackers
b) virus
c) spam
d) worms
Which of the following is a type of cyber security?
a) cloud security
b) network security
c) application security
d) all of these
Who is the father of computer security?
a) August Kerckoffs
b) Bob Thomas
c) Robert
d) Charles
Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
a) cyber-attack
b) computer security
c) cryptography
d) digital hacking
The linking of computers with a communication system is called….
a) assembling
b) interlocking
c) pairing
d) networking
Abuse messaging system to send unsolicited is called …….
a) phishing
b) adware
c) firewall
d) spam