Cyber Security Set 2

What is the full form of CIA under information security?
(A) Confidentiality Integrity Availability
(B) Criminal Investigation Agency
(C) Cost Information Agency
(D) Credit Integrity Assement
Confidentiality Integrity Availability
What is called periodic assessment of security vulnerability in computer system?
(A) Threat
(B) Attack
(C) Hacking
(D) Security audit
Security audit
What is called a single point of access for several networking services?
(A) Phishing
(B) Web service
(C) Directory service
(D) Worms
Directory service
Which activities endanger the sovereignty and integrity of nation?
(A) Cyber Terrorism
(B) Cyber vandalism
(C) Cyber squatting
(D) Carding
Cyber Terrorism
Which crime involves the use of computer networks to create, distribute or access materials that sexually exploit underage persons?
(A) Assault by Threat
(B) Cyber squatting
(C) Cyber vandalism
(D) Child pornography
Child pornography