Question

20. A computer checks the access. of user names and passwords for a match before granting
A. Website
C. Backup file
B. Network
D. Data base
21. All of the following are examples of real security and privacy risks. EXCEPT
A. Hackers
C. Viruses
B. Spam
D. Identity theft
22 is a computer crime in which a criminal breaks into a computer system for exploring details of information etc.
A. Hacking
C. Eavesdropping
B. Spoofing
23. Firewalls are used to protect against
D. Phishing
A. unauthorized Attacks
C. Data Driven Attacks
B. virus Attacks
D. Fire Attacks
24. Back up of the data files will help to prevent
A loss of confidentiality
Cvirus infection
B duplication of data
D. loss of data
25 can be used to minimize the risk of security breaches or viruses
A Firewall
C. Encryption
B. Backups
D. Digital signature
26. If you receive an e-mail from someone you don't know, what you should do?
A. Forward it to the police immediately
B. Delete it without opening it
C. Open it and respond to them saying you don't know them
D. Reply and ask them for their personal information
27 is a specialized form of online identity theft
A. Spoofing
C. Eavesdropping
B. Unauthorized disclosure
D. Phishing

Answers

Answered by GPT-4o mini
Here are the answers to your questions:

20. A computer checks the access of user names and passwords for a match before granting
**D. Database**

21. All of the following are examples of real security and privacy risks. EXCEPT
**B. Spam** (while spam can be annoying and pose some risks, it is not typically classified as a direct security risk like the others listed)

22. is a computer crime in which a criminal breaks into a computer system for exploring details of information etc.
**A. Hacking**

23. Firewalls are used to protect against
**A. unauthorized Attacks**

24. Back up of the data files will help to prevent
**D. loss of data**

25. can be used to minimize the risk of security breaches or viruses
**A. Firewall** (though all options can help in various ways, firewalls are specifically designed to prevent unauthorized access)

26. If you receive an e-mail from someone you don't know, what you should do?
**B. Delete it without opening it**

27. is a specialized form of online identity theft
**D. Phishing**

Let me know if you need further assistance!
There are no human answers yet. A form for humans to post answers is coming very soon!

Related Questions