Lesson 13A– Understanding the Need for Security Measureses – Multiple Choice Questions(MCQ) IT Theory is part of SAS PC3 Syllabus.In this post, we have provided all important MCQs that are likely to come in the upcoming SAS exam. All the Best !!!
- Burglars, viruses, and earthquakes are all examples of —— because they can harm a computer or its data.
a. Countermeasures
b. Threats
C. Vulnerabilities
d. Cybercrimes - It’s important to realize that threats, and the harm they can cause, are a matter of ——-
a. Degree
b. Trust
C. Tine
d. Fact - If you regularly back up your data, this against the threat of data loss.
a. Firewall
b. Class
C. Security
d. Countermeasure - In the right setting, a thief can try —–information by listening in while the victim gives credit card or the
personal information to a legitimate agent.
a. Sniffing
b. Spoofing
C. Snagging
d. Slipping - Because o the attention paid to the protection of ——, social engineering and low-tech swindles are
the predominant sources of identity theft.
a. Garbage
b. Transmitted data
C. Personal information
d. Hackers - Anytime you use a ‘store loyalty’ card to rent movies or buy groceries, the purchases are logged in a —
a. Spam
b. Transaction
C. Directory
d. Database - The use of data about your web-surfing habits is called ——-
a. Online profiling
b. IP profiling
C. User profiling
d. Surfer profiling - A——- is a small text file that a Web server can place on your computer
a. Cupcake
b. Cookie
C. Brownie
d. Tivinkle - A—–protects your computer system against voltage spikes.
a. Plug
b. Li ne drive
C. Battery backup
d. Surge suppressor - A—— is someone who uses a computer and a network or Internet connection to intrude into another
computer cr system to perform an illegal act.
a. Hacker
b. Programmer
C. Terrorist
d. Spammer - A —- is a step taken to protect data and systems from damage or any kind of threat.
a. Protect measure
b. Countermeasure
C. Safety measure
d. Security measure - ——is unwanted e-mail messages that are usually commercial in nature.
a. Cookies
b. Spam
C. Web bug
d. Virus - A(n) —— can obtain documents and conduct business transactions in the vicitim’s name
a. D Thief
b. Spammer
c. Programmer
d. Administrator - ———is a form of warfare which is used by the cyber terrorists to ham or gain control of important
computer systems.
a. Cyber hacking
b. Cyber tapping
C. Cybercrime
d. Cyber terrorism - ———-lefers to finding a user’s password by sharing, guessing or by capturing.
a. Sniffing
b. Spamming
C. Selling
d. Spoofing
THank YOU so much for providing