20. A computer checks the access. of user names and passwords for a match before granting

A. Website
C. Backup file
B. Network
D. Data base
21. All of the following are examples of real security and privacy risks. EXCEPT
A. Hackers
C. Viruses
B. Spam
D. Identity theft
22 is a computer crime in which a criminal breaks into a computer system for exploring details of information etc.
A. Hacking
C. Eavesdropping
B. Spoofing
23. Firewalls are used to protect against
D. Phishing
A. unauthorized Attacks
C. Data Driven Attacks
B. virus Attacks
D. Fire Attacks
24. Back up of the data files will help to prevent
A loss of confidentiality
Cvirus infection
B duplication of data
D. loss of data
25 can be used to minimize the risk of security breaches or viruses
A Firewall
C. Encryption
B. Backups
D. Digital signature
26. If you receive an e-mail from someone you don't know, what you should do?
A. Forward it to the police immediately
B. Delete it without opening it
C. Open it and respond to them saying you don't know them
D. Reply and ask them for their personal information
27 is a specialized form of online identity theft
A. Spoofing
C. Eavesdropping
B. Unauthorized disclosure
D. Phishing

1 answer

Here are the answers to your questions:

  1. A computer checks the access of user names and passwords for a match before granting
    D. Database

  2. All of the following are examples of real security and privacy risks. EXCEPT
    B. Spam (while spam can be annoying and pose some risks, it is not typically classified as a direct security risk like the others listed)

  3. is a computer crime in which a criminal breaks into a computer system for exploring details of information etc.
    A. Hacking

  4. Firewalls are used to protect against
    A. unauthorized Attacks

  5. Back up of the data files will help to prevent
    D. loss of data

  6. can be used to minimize the risk of security breaches or viruses
    A. Firewall (though all options can help in various ways, firewalls are specifically designed to prevent unauthorized access)

  7. If you receive an e-mail from someone you don't know, what you should do?
    B. Delete it without opening it

  8. is a specialized form of online identity theft
    D. Phishing

Let me know if you need further assistance!

Similar Questions
  1. 4. Confidentiality of User Names and Passwords.Customer is responsible for maintaining the confidentiality of the user name and
    1. answers icon 1 answer
    1. answers icon 13 answers
  2. As a physical security measure, _____.Question 5 options: electronic trackers are attached to a computer at the power outlet
    1. answers icon 1 answer
  3. Protections when using the cloud include all of the following EXCEPT:a User names and passwords b Anti-virus software c Deleting
    1. answers icon 1 answer
more similar questions