Which of the following issue involves in one of the ethical issue individual’s right to privacy?
Collecting Information
Managing information
Distributing Information
both a and b
Which network security technique is performed by asking the user a legal login – id?
Authentication
Firewall
Authorization
Identification
Which of the following is a computer crime?
System scanning at regular intervals
Theft of computer time
Swapping floppy disk
Conducting audit
Which one is not the major ethical issue?
Individual’s Right to Privacy
Intellectual Property Rights
Accuracy of Information
Unauthorized copying
Which one is an example for white-collar crimes?
Using pirated software
Changing the passwords frequently
Installing bugs
Write protected
How the hackers delete all the data from the system?
Using Trojan horses
By spamming
Through the attack sweeper
Inject some worms
How we ensure that the information is accurate?
Time
Concept
Value and importance
Quality
Which software privacy refers to purchasing a single licensed copy of software and loading it onto several computers?
Hard disk loading
Soft lifting
Renting
Downloading
Which form of attack will hackers used to attack the computers?
Spamming
Trojan horses
Counterfeit
Both a and b