1) Which of the following are forms of software piracy a) Spamming b) Softlifting c) Hard disc loading 2) Gaining unlawful access to a computer is a term for a) Network infrastructure attacks b) Hacker c) Cracker d) Hacking 3) Sending multiple undesired emails or text messages to users  a) Phishing b) Spamming c) Software piracy 4) Using someone else's work and showing it as your own is called a) Softlifting b) Piracy c) Hacking d) Plagiarism 5) General term to refer to viruses, worms, spyware etc. is a) Harmware b) Malware c) Un-ware d) Adware 6) Which of the following is not an internet safety measures a) While creating your screen name, do not include personal information b) share your password with anyone c) Don't post photos or videos online  7) What is an attempt to acquire sensitive information such as credit card number called?‎ a) Security policy.‎ b) Email filtering.‎ c) Phishing.‎ d) Digital signature.‎ 8) What is the process of verifying the user when log on to a PC called?‎ a) Authentication b) Virus ‎ c) Authorization d) Data Security 9) Which one of following hackers uses his skills for an ethical purpose?‎ a) White hat hacker b) Black hat hacker c) Grey hat hacker d) Red hat hacker 10) Which one of following hackers uses his skills for braking into computer system? ?‎ a) White hat hacker b) Black hat hacker c) Grey hat hacker d) Red hat hacker 11) Which one of following hackers uses his skills for look for vulnerabilities in a system without the owner's permission a) White hat hacker b) Black hat hacker c) Grey hat hacker d) Red hat hacker 12) Which of the following is different from a malware in that it can reproduce it self-contained, and it ‎doesn’t need a host application to be transported? ‎ a) ‎ Malicious internet downloads b) Worm ‎ c) Phish d) Trojan

ETHICS AND SAFETY MEASURES IN COMPUTING

Lestvica vodilnih

Vizualni slog

Možnosti

Preklopi predlogo

Obnovi samodejno shranjeno: ?