4. A person who uses his or her expertise to gain access to other people's computers to get information illegally or do damage is a

A. Hacker
B Analyst
C. Spammer
D. Programiner
5. What is Cyber Security
A. Cyber Security provides security against malware
B. Cyber Security provides security against cyber-terrorists
C. Cyber Security protects a system from cyber attacks
D. All of the mentioned
6. What does cyber security protect
A. Cyber security protects criminals
B. Cyber security protects internet-connected systems
C. Cyber security protects hackers
D. None of the mentioned
7. Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
A. Cyber-attack
C Cryptography
D. Digital hacking
Threat Prevention
B. Computer security
8. What are the features of cyber security?
A. Compliance
B Defense against internal threats
D. All of the above
9. Which of the following is an objective of network security"
A Confidentiality
C. Availability
B. Integrity
10. Which of the following is not a cybercrime?
A Denial of Service
D. All of the above
C Malware
B. Man in the Middle
11. Which of the following is a type of cyber-attack?
D. AES
A. Phishing
C. Password Attack
H SQL Injections
D. All of the above
12. Which of the following is not an advantage of cyber secunty?
A. Makes the system slower
B. Minimizes computer freezing and crashes
C. Gives privacy to users
D. Protects system against viruses

1 answer

Here are the answers to the questions:

  1. A person who uses his or her expertise to gain access to other people's computers to get information illegally or do damage is a
    A. Hacker

  2. What is Cyber Security?
    D. All of the mentioned (Cyber Security provides security against malware, cyber-terrorists, and protects a system from cyber attacks)

  3. What does cyber security protect?
    B. Cyber security protects internet-connected systems

  4. Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
    A. Cyber-attack

  5. What are the features of cyber security?
    D. All of the above (Compliance, Defense against internal threats)

  6. Which of the following is an objective of network security?
    D. All of the above (Confidentiality, Integrity, Availability)

  7. Which of the following is not a cybercrime?
    D. All of the above (Note: This seems to be a trick question; the answers are all forms of cybercrime, but if you're asking which one isn’t associated with the term "cybercrime," you may need to clarify.)

  8. Which of the following is a type of cyber-attack?
    D. All of the above (Phishing, Password Attack, SQL Injections)

  9. Which of the following is not an advantage of cyber security?
    A. Makes the system slower