Q: Which of the following is not an advantage of cyber security?
Solution: The advantages are minimization of computer freezing and crashes, user privacy, and protection against viruses, worms, etc. Disadvantages include the system becoming slow, configuring firewalls correctly can be difficult, need to update the new software in order to keep security up to date.
Q: “Cyberspace” was coined by _________
Solution: William Gibson, an American-Canadian fiction pioneer, and coiner, examined the many streams of technology and invented the word “cyberspace” in 1821. The phrase refers to linked technologies that aid in information exchange, interaction with digital devices, storage and digital entertainment, computer and network security, and other information technology-related matters.
Q: In ____________ hacking became a practical crime and a matter of concern in the field of cyber technology.
Solution: In the case of hackers in the 1970s, hackers and cyber thieves found out how wired technologies operate and how they might be abused to obtain a competitive edge or misuse the technology.
Q: Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______
Solution: Nation / State-sponsored hackers are those who are engaged or paid by a nation’s or state’s government to safeguard the country from cyber terrorists and other groups or individuals, as well as to expose their plans, communications, and activities.
Q: The Computer Fraud & Abuse Act was adopted in the United States in the year _____________
Solution: In 1984, the United States enacted this cyber security policy with the objective of guaranteeing that computer-related crimes are not gone unpunished. This regulation also prohibits unauthorized access to computers and the information they contain.
Q: Which of the following act violates cyber security?
Solution: A threat is a possible danger that might lead to a security breach and cause harm to the system or network. Vulnerability is a word that refers to a flaw in a network or system that might be exploited by an attacker. Exploiting a security flaw might result in unexpected and unwanted effects. A cyber-attack is an attempt by attackers to alter, delete, steal or expose any specific data by gaining unauthorized access.
Q: Which of the following actions compromise cyber security?
Solution: A threat is defined as a potential hazard that might result in a breach of security and cause harm to the system or network. Vulnerability is a term that refers to a weakness in a network or system that an attacker may exploit. Exploiting a weakness in security might have unintended and undesirable consequences.
Q: Which of the following is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic?
Solution: Pharming is a strategy and approach used by cybercriminals to create phony web pages and sites in order to mislead users into giving over personal information such as login IDs and passwords.
Q: ____________ is not a type of peer-to-peer cyber-crime?
Solution: Peer-to-peer includes phishing, as well as the distribution of Trojans and worms to individuals. The leakage of a huge number of people’s credit card data on the deep web, on the other hand, is classified as a computer-as-weapon cyber-crime.
Q: Gaining Wi-Fi access dishonestly is not a cyber-crime.
Solution: It is a cyber-crime, according to section 66 of the IT Act of 2000, which was subsequently replaced by more wider and precise legislation (the IT Act of 2008), if anybody accesses anyone’s Wi-Fi network without the owner’s consent or for malevolent purposes.
You Have Score    | /10 |