Cyber Security Set 2


What is the full form of CIA under information security?
  
    (A) Confidentiality Integrity Availability
    (B) Criminal Investigation Agency
    (C) Cost Information Agency
    (D) Credit Integrity Assement

Confidentiality Integrity Availability

What is called periodic assessment of security vulnerability in computer system?
  
    (A) Threat
    (B) Attack
    (C) Hacking
    (D) Security audit

Security audit

What is called a single point of access for several networking services?
  
    (A) Phishing
    (B) Web service
    (C) Directory service
    (D) Worms

Directory service

Which activities endanger the sovereignty and integrity of nation?
  

    (A) Cyber Terrorism
    (B) Cyber vandalism
    (C) Cyber squatting
    (D) Carding

Cyber Terrorism

Which crime involves the use of computer networks to create, distribute or access materials that sexually exploit underage persons?
  
    (A) Assault by Threat
    (B) Cyber squatting
    (C) Cyber vandalism
    (D) Child pornography

Child pornography