1. Burglars, viruses, and earthquakes are all examples of
Exercise 1,
because they
Kaltiple choice questions:
b. Threats
on infine
d. Cyber crimes
against the threat of data
100 Fine
can harm a computerorits data.
a. Countermeasures
c. Vulnerabilities
2. If you regularly back up your data, this is a
loss.
a. Firewall
c. Security
3. A
b. Class
O Fine
d. Countermeasure
is someone who uses a computer and a network or Internet
connection to intrude into another computer or system to perform an illegal
neor
a. Hacker
or
act.
b. Programmer
c. Terrorist
d. Spammer
4. A(n)
can obtain documents and conduct business transactions in the
victim's name.
a. ID thief
b. Spammer
d. Administrator
c. Programmer
5.
is a form of warfare which is used by the cyber terrorists to harm or
gain control of important computer systems.
a. Cyberhacking
b. Cybertapping
c. Cybercrime
d. Cyberterrorism
6. refers to finding a user's password by sharing, guessing or by
capturing
a. Sniffing
b. Spamming
c. Smelling
d. Spoofing
Answers
Answered by
0
Answer:
2.a
3.b
4.d
5.c
6.c smelling
Similar questions
Science,
2 months ago
CBSE BOARD X,
2 months ago
India Languages,
2 months ago
English,
5 months ago
English,
5 months ago
Math,
10 months ago
Geography,
10 months ago