Here are the answers to your questions:
-
A computer checks the access of user names and passwords for a match before granting
D. Database -
All of the following are examples of real security and privacy risks. EXCEPT
B. Spam (while spam can be annoying and pose some risks, it is not typically classified as a direct security risk like the others listed) -
is a computer crime in which a criminal breaks into a computer system for exploring details of information etc.
A. Hacking -
Firewalls are used to protect against
A. unauthorized Attacks -
Back up of the data files will help to prevent
D. loss of data -
can be used to minimize the risk of security breaches or viruses
A. Firewall (though all options can help in various ways, firewalls are specifically designed to prevent unauthorized access) -
If you receive an e-mail from someone you don't know, what you should do?
B. Delete it without opening it -
is a specialized form of online identity theft
D. Phishing
Let me know if you need further assistance!