Which of the following measures will involve in data security?
Secured waste
Internal controls
Cryptography
All of these
Which network security technique is performed by asking the user a legal login – id?
Authentication
Firewall
Authorization
Identification
Which one is an example for white-collar crimes?
Using pirated software
Changing the passwords frequently
Installing bugs
Write protected
Which of the following issue involves in one of the ethical issue individual’s right to privacy?
Collecting Information
Managing information
Distributing Information
both a and b
Which of the following is a computer crime?
System scanning at regular intervals
Theft of computer time
Swapping floppy disk
Conducting audit
How the hackers delete all the data from the system?
Using Trojan horses
By spamming
Through the attack sweeper
Inject some worms
Which software privacy refers to purchasing a single licensed copy of software and loading it onto several computers?
Hard disk loading
Soft lifting
Renting
Downloading
Which one is meant by denial of intellectual property rights to the software creator/developer?
Software privacy
Hacking
Uploading
Which form of attack will used by hackers to get into remote computers?
Sweeper
Password guessing
Worms
Viruses