Computer Science, asked by Diamond838210, 5 months ago

1. Burglars, viruses, and earthquakes are all examples of
Exercise 1,
because they
Kaltiple choice questions:
b. Threats
on infine
d. Cyber crimes
against the threat of data
100 Fine
can harm a computerorits data.
a. Countermeasures
c. Vulnerabilities
2. If you regularly back up your data, this is a
loss.
a. Firewall
c. Security
3. A
b. Class
O Fine
d. Countermeasure
is someone who uses a computer and a network or Internet
connection to intrude into another computer or system to perform an illegal
neor
a. Hacker
or
act.
b. Programmer
c. Terrorist
d. Spammer
4. A(n)
can obtain documents and conduct business transactions in the
victim's name.
a. ID thief
b. Spammer
d. Administrator
c. Programmer
5.
is a form of warfare which is used by the cyber terrorists to harm or
gain control of important computer systems.
a. Cyberhacking
b. Cybertapping
c. Cybercrime
d. Cyberterrorism
6. refers to finding a user's password by sharing, guessing or by
capturing
a. Sniffing
b. Spamming
c. Smelling
d. Spoofing​

Answers

Answered by kurvasiddu0911
0

Answer:

2.a

3.b

4.d

5.c

6.c smelling

Similar questions