Which one is an example for white-collar crimes?
Using pirated software
Changing the passwords frequently
Installing bugs
Write protected
Which mechanism will prevent the unauthorized internet users from accessing intranets?
Firewall
Identification
Authentication
Authorization
What is termed as password protection?
Which form of attack will used by hackers to get into remote computers?
Sweeper
Password guessing
Worms
Viruses
Which software privacy refers to purchasing a single licensed copy of software and loading it onto several computers?
Hard disk loading
Soft lifting
Renting
Downloading
Which one is meant by denial of intellectual property rights to the software creator/developer?
Software privacy
Hacking
Uploading
Which of the following measures will involve in data security?
Secured waste
Internal controls
Cryptography
All of these
Which form of attack will hackers used to attack the computers?
Spamming
Trojan horses
Counterfeit
Both a and b
Which one forms the intellectual capital for a person or body?
Data
Information
Software
Shareware