Professional Documents
Culture Documents
3) Which security goal is to ensure the data could not be altered by the unauthorized user?
A) Integrity
B) Confidentiality
C) Availability
D) Legitimate use
C) Interruption
D) Interception
6) Physical access controls, such as locked doors and windows usually are adequate to protect against
__________________.
A) software privacy
B) unauthorized access
C) hardware theft
D) all of the above
10) A computer infected by a virus, worm or Trojan horse may have any of the following symptoms
EXCEPT__________________.
A) available memory is more than expected
B) system properties change
C) existing files and programs disappear
D) files become corrupted
QUIZ 1 – COMPUTER ETHICS AND CYBER LAWS
11) All the statements below are TRUE for the worm EXCEPT__________.
A) self-contained
B) replication
C) require a host program as a carrier
D) activated by creating process
A) Resource sharing.
B) Distributing the workload.
C) Increased reliability.
D) Expandability.
19) A ______________ gives authors and artists exclusive rights to duplicate, publish and sell their
materials.
A) copyright
B) license
C) password
D) firewall
20) The rights of employees and employers are as listed EXCEPT ________.
A) ownership of a company
B) trade secret protection
C) employment contract
D) work for hire