Contents

Which of the following is example of real security and privacy threats?
a) hackers                            
b) virus
c) spam                                 
d) worms

c

Which of the following is a type of cyber security?
a) cloud security 
b) network security
c) application security
d) all of these


d

Who is the father of computer security?
a) August Kerckoffs
b) Bob Thomas
c) Robert                                                              
d) Charles


a

Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
a) cyber-attack   
b) computer security
c) cryptography  
d) digital hacking


a

The linking of computers with a communication system is called….
a) assembling 
b) interlocking
c) pairing                    
d) networking


d

Abuse messaging system to send unsolicited is called …….
a) phishing                           
b) adware
c) firewall                             
d) spam

d