7. Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?

A. Cyber-attack
C Cryptography
D. Digital hacking
B. Computer security
8. What are the features of cyber security?
A. Compliance
B Defense against internal threats
C. Threat prevention
D. All of the above
9. Which of the following is an objective of network security"
A Confidentiality
C. Availability
B. Integrity
D. All of the above
10. Which of the following is not a cybercrime?
A Denial of Service
C Malware
B. Man in the Middle
D. AES
11. Which of the following is a type of cyber-attack?
A. Phishing
C. Password Attack
B.SQL Injections
D. All of the above

1 answer

Here are the answers to your questions:

  1. A. Cyber-attack - This is defined as an attempt to steal, spy, damage, or destroy computer systems, networks, or their associated information.

  2. D. All of the above - The features of cyber security include compliance, defense against internal threats, and threat prevention.

  3. D. All of the above - The objectives of network security include confidentiality, integrity, and availability.

  4. D. AES - AES (Advanced Encryption Standard) is a cryptographic algorithm and not a cybercrime, while the others listed are types of cybercrimes.

  5. D. All of the above - Phishing, SQL injections, and password attacks are all types of cyber-attacks.