MCQ’s
Chapter 4 – Data and Privacy

Data and Privacy – MCQ’s

  1. Which of the following doesn’t include the type of software piracy?

(a) Softlifting

(b) liability          ✓      

(c) client server overuse

(d) online piracy

  1. Which of the following is not a cybercrime?

» View More

(a) Hacking

(b) phishing crime

(c) identity theft                    

(d) decryption  ✓

  1. Which of the following is not the characteristics of phishing emails?

(a) Official data breach notification             

(b) email account update

(c) IT reminder          ✓

(d) similar domain of actual website

  1. Which of the following is not a characteristics of phishing website?

(a) Similar domain of actual website                       

(b) using of forms to collect visitors                       

(c) Actual link to web content              ✓          

(d) email account updates

  1. Which of the following is not a characteristic of a good password?

(a) Is eight characters long?

(b) Doesn’t contain username

(c) Contains uppercase letters

(d) Password is your name only  ✓

  1. Making illegal copies of software is called:

(a) Stolen

(b) phishing crime     

(c) identity theft                    

(d) piracy  ✓

  1. Which is the general term for any type of information processing that can be represented mathematically?

(a) Computation     ✓     

(b) liability                

(c) client server overuse        

(d) online piracy

  1. Which is the process of encoding data?

(a) Service                 

(b) online banking     

(c) client                                

(d) encryption  ✓

  1. When a key has less number of character than the text to encrypt, then repeating letters of the key is called:

(a) Interim ciphertext        ✓      

(b) cyber                    

(c) client server overuse        

(d) online piracy

  1. Which is a cyber-attack to make machine or network resource unavailable for a user?

(a) Softlifting            

(b) liability

(c) denial of service   ✓            

(d) online piracy

  1. CAPTCHA stands for:

(a) Completely automated public Turing  ✓

(b) Literally automated

(c) automated public Turing

(d) Automated

  1. Every organization to whom the data is entrusted, it is their responsibility regarding ____ of the data.

(a) Confidentiality    

(b) privacy                 

(c) online privacy                  

(d) confidentiality and privacy  ✓

  1. Which is called borrowing and installing a copy of a software application from a colleague?

(a) Softlifting   ✓          

(b) liability                

(c) denial of service              

(d) online piracy

  1. Which is installing more copies of the software than you have license for?

(a) Internet cyber text           

(b) cyber                    

(c) client server overuse          ✓

(d) online piracy

  1. Which means installing and selling unauthorized copies of software on refurbished or new computers?

(a) Confidentiality    

(b) privacy                 

(c) online privacy                  

(d) hard-disk loading  ✓

  1. Which is called duplicating and selling copyrighted programs?

(a) Service                 

(b) counterfeiting   ✓   

(c) client                                

(d) encryption

  1. Using computer for the purpose of some unauthorized activities is called:

(a) Fraud or misuse      ✓

(b) selling and printing

(c) denial of service                        

(d) piracy

  1. Promises made by a software developer is known as warranty or:

(a) Confidentiality    

(b) service                 

(c) liability          ✓                   

(d) loading

  1. Which can protect an idea so that it won’t be misuse and the owner will attain its full rights?

(a) Hacking                

(b) patent                ✓     

(c) identity theft                    

(d) decryption

  1. To protect value and usefulness we may imply:

(a) Trade secrets          ✓

(b) cyber                    

(c) client server overuse        

(d) online piracy

  1. The computer can be attacked while sitting remotely, in this way sensitive information will be:

(a) Hacking                

(b) sabotaged            ✓   

(c) identity theft                    

(d) decryption

  1. Encoding means conversion of the data to an unreadable format which is called:

(a) Ciphertext           ✓               

(b) online banking     

(c) client                                

(d) encryption

  1. Which is used to read the ciphertext?

(a) Key           ✓

(b) board

(c) mouse                               

(d) trackball

  1. Which are used for authentication to enter a system?

(a) Hacking                

(b) sabotaged             

(c) passwords            ✓               

(d) decryption

  1. A crime in which computer network or devices are used is called a:

(a) Lefting

(b) phishing crime     

(c) identity theft                    

(d) cybercrime  ✓

  1. Illegally accessing someone else’s computer is called:

(a) Hacking          ✓        

(b) sabotaged             

(c) passwords                        

(d) decryption

  1. The foundation of all security systems is formed on:

(a) Ethical principles   ✓

(b) formal principles

(c) principles                         

(d) outline

  1. Which is the illegal copying, distribution, or usage of software?

(a) Service                 

(b) online banking     

(c) client                                

(d) software piracy  ✓

  1. Some software companies sell software with a confidential text, called the:

(a) Key               ✓          

(b) privacy                 

(c) software                           

(d) phishing

  1. Typically involves downloading illegal software:

(a) Lefting

(b) phishing crime     

(c) identity theft                    

(d) online piracy  ✓

  1. Some malicious user disguises himself as our friend and tries to get some confidential information:

(a) Lefting

(b) phishing             ✓    

(c) identity theft                    

(d) online piracy

  1. Which is a way to protect an idea?

(a) Patent                  ✓   

(b) online banking     

(c) client                                

(d) software piracy

  1. Which are usually the secrets that are playing an important role for the success of a company?

(a) Trade secrets      ✓    

(b) cyber                    

(c) client server overuse        

(d) online piracy

  1. Which is a serious attack on a computer system?

(a) Hacking                

(b) sabotage           ✓      

(c) passwords             

(d) decryption

  1. A____ is a computer program written with negative intentions:

(a) Patent                   

(b) virus             ✓          

(c) client                    

(d) software piracy

  1. NADRA stands for:

(a) National database and registration authority  ✓

(b) National database resolution

(c) Registration authority

(d) National drugs registration

  1. Which means that we want to keep the data correct?

(a) Integrity            ✓     

(b) cyber                    

(c) client server overuse

(d) online piracy

  1. Which means that we want to have access to the data when we want?

(a) Patent                   

(b) availability       ✓     

(c) client                    

(d) software piracy

  1. Companies want to read minds of Web surfers and sometimes they store some piece of information with the Web Surfer, called:

(a) Integrity               

(b) cyber                    

(c) cookies               ✓    

(d) online piracy

  1. Using ____ companies are able to track purchases and gather personal data:

(a) Data                      

(b) information          

(c) cookies          ✓         

(d) online piracy

  1. Which is the process of encoding data in such a way that only authorized person can read it?

(a) Service                 

(b) counterfeiting      

(c) client                    

(d) encryption  ✓

  1. A computer expert who can steal data when it moves from one location to other, is called:

(a) Hacker           ✓         

(b) sabotaged             

(c) passwords             

(d) decryption

  1. Which methods are the methods of encryption in which the characters of original text are replaced by some other characters?

(a) Service                 

(b) counterfeiting      

(c) client                    

(d) substitution cipher  ✓

  1. Caesar was a Roman politician and military general who played a critical role in the rise of the:

(a) Asia Empire         

(b) Roman empire        ✓

(c) American Empire

(d) Pakistani Empire

45 in Roman Empire ____ method is used this method of encryption for sending messages to his soldiers and generals:

(a) Service                 

(b) online banking     

(c) client                    

(d) Caesar  ✓

  1. In which method, we replace each alphabet in the plain text by another alphabet:

(a) Integrity

(b) cyber

(c) Caesar Cipher      ✓  

(d) privacy

  1. Vigenere cipher is another substitution cipher, which uses a table known as:

(a) Vigenere cipher table   ✓

(b) simple table   

(c) Complex table      

(d) round table

  1. In this method, we have a substitution key that is combined with the plain text to generate the ciphertext:

(a) Vigenere Cipher method     ✓                     

(b) simple method

(c) simplex method                                       

(d) round method

  1. Cryptographic keys are used to read a _____ message.

(a) Double

(b) right

(c) center                   

(d) encrypted  ✓

  1. Which attackers often target web servers of high-profile organizations such as banking, commerce, and media companies, or Government and trade organizations?

(a) Service

(b) dos              ✓           

(c) client                    

(d) substitution cipher

» View Less

Useful? Share with your friends.

Leave a Reply