Unit 4 – Data and Privacy (MCQs From Board)
Quiz-summary
0 of 32 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
Information
Unit 4 – Data and Privacy (MCQs From Board)
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 32 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Unit 4 – Data and Privacy (MCQs From Board) 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- Answered
- Review
-
Question 1 of 32
1. Question
1 pointsProtecting data from malicious users Is called:
Correct
Incorrect
-
Question 2 of 32
2. Question
1 points____________ is the responsibility to keep other’s personal information private.
Correct
Incorrect
-
Question 3 of 32
3. Question
1 points_______________ means making illegal copies.
Correct
Incorrect
-
Question 4 of 32
4. Question
1 pointsSoftware _______ is the illegal copying, distributing, or usage of software.
Correct
Incorrect
-
Question 5 of 32
5. Question
1 pointsSome software companies sell software along with a confidential text called:
Correct
Incorrect
-
Question 6 of 32
6. Question
1 pointsWhich type of software piracy is borrowing and installing a copy of software application from colleague?
Correct
Incorrect
-
Question 7 of 32
7. Question
1 points_______________ is called duplicating and selling software having copyrighted program.
Correct
Incorrect
-
Question 8 of 32
8. Question
1 pointsWhich type of software piracy typically involves downloading illegal software?
Correct
Incorrect
-
Question 9 of 32
9. Question
1 pointsWhich type of software piracy is installing more copies of the software than you have licenses for?
Correct
Incorrect
-
Question 10 of 32
10. Question
1 points___________________ can protect an idea from misuse and the owner will get its full rights.
Correct
Incorrect
-
Question 11 of 32
11. Question
1 pointsComputer virus is simply a:
Correct
Incorrect
-
Question 12 of 32
12. Question
1 pointsA ______________ is a computer program that is written with negative intentions.
Correct
Incorrect
-
Question 13 of 32
13. Question
1 pointsFor confidentiality, data to be sent over the network is:
Correct
Incorrect
-
Question 14 of 32
14. Question
1 pointsCaesar cipher is an example of:
Correct
Incorrect
-
Question 15 of 32
15. Question
1 points_____________________ is a process of encoding data in a way that only authorized person can read it:
Correct
Incorrect
-
Question 16 of 32
16. Question
1 pointsIn the encryption process, the unencrypted and readable data is called:
Correct
Incorrect
-
Question 17 of 32
17. Question
1 pointsThe encrypted data is also called:
Correct
Incorrect
-
Question 18 of 32
18. Question
1 pointsAn ___________ algorithm transform plaintext to Ciphertext.
Correct
Incorrect
-
Question 19 of 32
19. Question
1 pointsAn____________ algorithm transform ciphertext to plaintext.
Correct
Incorrect
-
Question 20 of 32
20. Question
1 pointsThe secret word or number used for authentication to enter a system is called:
Correct
Incorrect
-
Question 21 of 32
21. Question
1 pointsWhich of the following is used to read an encrypted message?
Correct
Incorrect
-
Question 22 of 32
22. Question
1 pointsWhich of the following is an example of a good password?
Correct
Incorrect
-
Question 23 of 32
23. Question
1 pointsThe distorted series of letters and numbers to ensure that you are a human and not a computer is called:
Correct
Incorrect
-
Question 24 of 32
24. Question
1 pointsA crime in which computer network or devices are used is called:
Correct
Incorrect
-
Question 25 of 32
25. Question
1 pointsCybercrime includes:
Correct
Incorrect
-
Question 26 of 32
26. Question
1 pointsMost computer crime are committed by:
Correct
Incorrect
-
Question 27 of 32
27. Question
1 pointsAn act of unauthorized access to the computer or network is called:
Correct
Incorrect
-
Question 28 of 32
28. Question
1 pointsA person who gains illegal access. to a computer system is called:
Correct
Incorrect
-
Question 29 of 32
29. Question
1 pointsHacker may steal:
Correct
Incorrect
-
Question 30 of 32
30. Question
1 points_________ is a program to collect Information about user activities without his knowledge.
Correct
Incorrect
-
Question 31 of 32
31. Question
1 pointsA fraudulent attempt by sending emails to obtain sensitive information such as password is called:
Correct
Incorrect
-
Question 32 of 32
32. Question
1 pointsWhich one is a cyber-attack to make a machine or network resource unavailable?
Correct
Incorrect