SlideShare a Scribd company logo
1. Integrity ensures that only authorized users can view the information*
True
False
2. RootKit is a set of software tools that break into a PC, obtain special privileges and then hide
all traces of its existence.*
True
False
3. Script Kiddies download and run hacking programs without understanding technology*
True
False
4. Backdoors allow the attacker to return to the PC at a later time and bypass any security
settings.*
True
False
5. Virus self replicate without user interaction*
True
False
6. Universally Connected Devices is an attacks which can come from anywhere*
True
False
7. Cyber Terrorists highly motivated, less likely to take risks, better funded, more determined
than hackers*
True
False
8. Macro Virus lie dormant until it is triggered by a specific logical event*
True
False
9. Vishing is a technique used by Social Engineers to scam people*
True
False
10. Worm self replicate with help from user.*
True
False
11. Resident Virus is a program that advertises one activity but performs some other malicious
activity.*
True
False
12. Confidentiality ensures that data is NOT altered*
True
False
13.Social Engineering relies on tricking and deceiving someone to provide secure information*
True
False
14. Zero Day Attack is an Attack which occurs when an attacker exploits a previously unknown
flaw*
True
False
15. Spies are knowledgeable techies hired to hack specific systems (hired gun slingers)*
True
False

More Related Content

Similar to 1- Integrity ensures that only authorized users can view the informati.pdf

Report of android hacking
Report of android hackingReport of android hacking
Report of android hacking
div2345
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Yasmin Ismail
 
Malware Applications Development.pptx
Malware Applications Development.pptxMalware Applications Development.pptx
Malware Applications Development.pptx
FullstackSRM
 
A survey of ethical hacking process and security
A survey of ethical hacking process and securityA survey of ethical hacking process and security
A survey of ethical hacking process and security
Ahmad El Tawil
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
IRJET Journal
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
amit kumar
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
Mohsin Dahar
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
Kajal Mittal
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Ritwick Mukherjee
 
Top 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOSTop 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOS
Innovation Network Technologies: InNet
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
a documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppta documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppt
NebiyuTeferaShite
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
VIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptxVIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptx
SiddeshGowda8
 
Fidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception Solution
Fidelis Cybersecurity
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
Gaurav Mishra
 

Similar to 1- Integrity ensures that only authorized users can view the informati.pdf (20)

THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Report of android hacking
Report of android hackingReport of android hacking
Report of android hacking
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Malware Applications Development.pptx
Malware Applications Development.pptxMalware Applications Development.pptx
Malware Applications Development.pptx
 
A survey of ethical hacking process and security
A survey of ethical hacking process and securityA survey of ethical hacking process and security
A survey of ethical hacking process and security
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Top 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOSTop 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOS
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
a documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppta documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppt
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
VIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptxVIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptx
 
Fidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception Solution
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 

More from WilliamTvuHendersonk

1- (a) Explain why it is advantageous have a highly convoluted cerebru.pdf
1- (a) Explain why it is advantageous have a highly convoluted cerebru.pdf1- (a) Explain why it is advantageous have a highly convoluted cerebru.pdf
1- (a) Explain why it is advantageous have a highly convoluted cerebru.pdf
WilliamTvuHendersonk
 
1- (4 Pts) Translate the following assembly language instructions to t.pdf
1- (4 Pts) Translate the following assembly language instructions to t.pdf1- (4 Pts) Translate the following assembly language instructions to t.pdf
1- (4 Pts) Translate the following assembly language instructions to t.pdf
WilliamTvuHendersonk
 
1- (2 pts) Software engineering is an engineering discipline that is c.pdf
1- (2 pts) Software engineering is an engineering discipline that is c.pdf1- (2 pts) Software engineering is an engineering discipline that is c.pdf
1- (2 pts) Software engineering is an engineering discipline that is c.pdf
WilliamTvuHendersonk
 
1) Writed 2 verses regarding the place where GOD- the Heaven - and Jes.pdf
1) Writed 2 verses regarding the place where GOD- the Heaven - and Jes.pdf1) Writed 2 verses regarding the place where GOD- the Heaven - and Jes.pdf
1) Writed 2 verses regarding the place where GOD- the Heaven - and Jes.pdf
WilliamTvuHendersonk
 
1) During the months of January- Pearson Corporation sold goods to cus.pdf
1) During the months of January- Pearson Corporation sold goods to cus.pdf1) During the months of January- Pearson Corporation sold goods to cus.pdf
1) During the months of January- Pearson Corporation sold goods to cus.pdf
WilliamTvuHendersonk
 
1) Key strategic sourcing criteria for determining whether functions s.pdf
1) Key strategic sourcing criteria for determining whether functions s.pdf1) Key strategic sourcing criteria for determining whether functions s.pdf
1) Key strategic sourcing criteria for determining whether functions s.pdf
WilliamTvuHendersonk
 
1) Are nervous systems a homology shared by all animals- Why or why no.pdf
1) Are nervous systems a homology shared by all animals- Why or why no.pdf1) Are nervous systems a homology shared by all animals- Why or why no.pdf
1) Are nervous systems a homology shared by all animals- Why or why no.pdf
WilliamTvuHendersonk
 
1)- A constraint is Question 18 options- an addition to a project.pdf
1)-  A constraint is Question 18 options-     an addition to a project.pdf1)-  A constraint is Question 18 options-     an addition to a project.pdf
1)- A constraint is Question 18 options- an addition to a project.pdf
WilliamTvuHendersonk
 
1) Describe the nucleosome structure of DNA using a diagram- How do 1.pdf
1) Describe the nucleosome structure of DNA using a diagram-  How do 1.pdf1) Describe the nucleosome structure of DNA using a diagram-  How do 1.pdf
1) Describe the nucleosome structure of DNA using a diagram- How do 1.pdf
WilliamTvuHendersonk
 
1- (10 pts) State what is confidentiality- integrity- and availability.pdf
1- (10 pts) State what is confidentiality- integrity- and availability.pdf1- (10 pts) State what is confidentiality- integrity- and availability.pdf
1- (10 pts) State what is confidentiality- integrity- and availability.pdf
WilliamTvuHendersonk
 
1 point Concerning the pancreas- The body of the pancreas is the most.pdf
1 point Concerning the pancreas- The body of the pancreas is the most.pdf1 point Concerning the pancreas- The body of the pancreas is the most.pdf
1 point Concerning the pancreas- The body of the pancreas is the most.pdf
WilliamTvuHendersonk
 
1) Which steps below are NOT the focus of the implementation phase of.pdf
1) Which steps below are NOT the focus of the implementation phase of.pdf1) Which steps below are NOT the focus of the implementation phase of.pdf
1) Which steps below are NOT the focus of the implementation phase of.pdf
WilliamTvuHendersonk
 
1 Point In which of the following aspects- a web search engine is cons.pdf
1 Point In which of the following aspects- a web search engine is cons.pdf1 Point In which of the following aspects- a web search engine is cons.pdf
1 Point In which of the following aspects- a web search engine is cons.pdf
WilliamTvuHendersonk
 
1) Show that n2n is in O(n2) 2) Show that n3+n is in (n2)- 3) Show tha.pdf
1) Show that n2n is in O(n2) 2) Show that n3+n is in (n2)- 3) Show tha.pdf1) Show that n2n is in O(n2) 2) Show that n3+n is in (n2)- 3) Show tha.pdf
1) Show that n2n is in O(n2) 2) Show that n3+n is in (n2)- 3) Show tha.pdf
WilliamTvuHendersonk
 
1) Important standards in executive-level communication include the fo.pdf
1) Important standards in executive-level communication include the fo.pdf1) Important standards in executive-level communication include the fo.pdf
1) Important standards in executive-level communication include the fo.pdf
WilliamTvuHendersonk
 
1- What is Buddhism2- Introduction to buddhism3- Religious factors of.pdf
1- What is Buddhism2- Introduction to buddhism3- Religious factors of.pdf1- What is Buddhism2- Introduction to buddhism3- Religious factors of.pdf
1- What is Buddhism2- Introduction to buddhism3- Religious factors of.pdf
WilliamTvuHendersonk
 
1&2 N Part 1- Qualitative Thematic Maps (13 points) Answer the quest.pdf
1&2 N   Part 1- Qualitative Thematic Maps (13 points) Answer the quest.pdf1&2 N   Part 1- Qualitative Thematic Maps (13 points) Answer the quest.pdf
1&2 N Part 1- Qualitative Thematic Maps (13 points) Answer the quest.pdf
WilliamTvuHendersonk
 
1- Which program step combines separately-compiled object files in the.pdf
1- Which program step combines separately-compiled object files in the.pdf1- Which program step combines separately-compiled object files in the.pdf
1- Which program step combines separately-compiled object files in the.pdf
WilliamTvuHendersonk
 
1- Which one of the following statements is incorrect- a)Trade unions.pdf
1- Which one of the following statements is incorrect- a)Trade unions.pdf1- Which one of the following statements is incorrect- a)Trade unions.pdf
1- Which one of the following statements is incorrect- a)Trade unions.pdf
WilliamTvuHendersonk
 
1- Outline and describe the two (2) checkpoints that determine the fat.pdf
1- Outline and describe the two (2) checkpoints that determine the fat.pdf1- Outline and describe the two (2) checkpoints that determine the fat.pdf
1- Outline and describe the two (2) checkpoints that determine the fat.pdf
WilliamTvuHendersonk
 

More from WilliamTvuHendersonk (20)

1- (a) Explain why it is advantageous have a highly convoluted cerebru.pdf
1- (a) Explain why it is advantageous have a highly convoluted cerebru.pdf1- (a) Explain why it is advantageous have a highly convoluted cerebru.pdf
1- (a) Explain why it is advantageous have a highly convoluted cerebru.pdf
 
1- (4 Pts) Translate the following assembly language instructions to t.pdf
1- (4 Pts) Translate the following assembly language instructions to t.pdf1- (4 Pts) Translate the following assembly language instructions to t.pdf
1- (4 Pts) Translate the following assembly language instructions to t.pdf
 
1- (2 pts) Software engineering is an engineering discipline that is c.pdf
1- (2 pts) Software engineering is an engineering discipline that is c.pdf1- (2 pts) Software engineering is an engineering discipline that is c.pdf
1- (2 pts) Software engineering is an engineering discipline that is c.pdf
 
1) Writed 2 verses regarding the place where GOD- the Heaven - and Jes.pdf
1) Writed 2 verses regarding the place where GOD- the Heaven - and Jes.pdf1) Writed 2 verses regarding the place where GOD- the Heaven - and Jes.pdf
1) Writed 2 verses regarding the place where GOD- the Heaven - and Jes.pdf
 
1) During the months of January- Pearson Corporation sold goods to cus.pdf
1) During the months of January- Pearson Corporation sold goods to cus.pdf1) During the months of January- Pearson Corporation sold goods to cus.pdf
1) During the months of January- Pearson Corporation sold goods to cus.pdf
 
1) Key strategic sourcing criteria for determining whether functions s.pdf
1) Key strategic sourcing criteria for determining whether functions s.pdf1) Key strategic sourcing criteria for determining whether functions s.pdf
1) Key strategic sourcing criteria for determining whether functions s.pdf
 
1) Are nervous systems a homology shared by all animals- Why or why no.pdf
1) Are nervous systems a homology shared by all animals- Why or why no.pdf1) Are nervous systems a homology shared by all animals- Why or why no.pdf
1) Are nervous systems a homology shared by all animals- Why or why no.pdf
 
1)- A constraint is Question 18 options- an addition to a project.pdf
1)-  A constraint is Question 18 options-     an addition to a project.pdf1)-  A constraint is Question 18 options-     an addition to a project.pdf
1)- A constraint is Question 18 options- an addition to a project.pdf
 
1) Describe the nucleosome structure of DNA using a diagram- How do 1.pdf
1) Describe the nucleosome structure of DNA using a diagram-  How do 1.pdf1) Describe the nucleosome structure of DNA using a diagram-  How do 1.pdf
1) Describe the nucleosome structure of DNA using a diagram- How do 1.pdf
 
1- (10 pts) State what is confidentiality- integrity- and availability.pdf
1- (10 pts) State what is confidentiality- integrity- and availability.pdf1- (10 pts) State what is confidentiality- integrity- and availability.pdf
1- (10 pts) State what is confidentiality- integrity- and availability.pdf
 
1 point Concerning the pancreas- The body of the pancreas is the most.pdf
1 point Concerning the pancreas- The body of the pancreas is the most.pdf1 point Concerning the pancreas- The body of the pancreas is the most.pdf
1 point Concerning the pancreas- The body of the pancreas is the most.pdf
 
1) Which steps below are NOT the focus of the implementation phase of.pdf
1) Which steps below are NOT the focus of the implementation phase of.pdf1) Which steps below are NOT the focus of the implementation phase of.pdf
1) Which steps below are NOT the focus of the implementation phase of.pdf
 
1 Point In which of the following aspects- a web search engine is cons.pdf
1 Point In which of the following aspects- a web search engine is cons.pdf1 Point In which of the following aspects- a web search engine is cons.pdf
1 Point In which of the following aspects- a web search engine is cons.pdf
 
1) Show that n2n is in O(n2) 2) Show that n3+n is in (n2)- 3) Show tha.pdf
1) Show that n2n is in O(n2) 2) Show that n3+n is in (n2)- 3) Show tha.pdf1) Show that n2n is in O(n2) 2) Show that n3+n is in (n2)- 3) Show tha.pdf
1) Show that n2n is in O(n2) 2) Show that n3+n is in (n2)- 3) Show tha.pdf
 
1) Important standards in executive-level communication include the fo.pdf
1) Important standards in executive-level communication include the fo.pdf1) Important standards in executive-level communication include the fo.pdf
1) Important standards in executive-level communication include the fo.pdf
 
1- What is Buddhism2- Introduction to buddhism3- Religious factors of.pdf
1- What is Buddhism2- Introduction to buddhism3- Religious factors of.pdf1- What is Buddhism2- Introduction to buddhism3- Religious factors of.pdf
1- What is Buddhism2- Introduction to buddhism3- Religious factors of.pdf
 
1&2 N Part 1- Qualitative Thematic Maps (13 points) Answer the quest.pdf
1&2 N   Part 1- Qualitative Thematic Maps (13 points) Answer the quest.pdf1&2 N   Part 1- Qualitative Thematic Maps (13 points) Answer the quest.pdf
1&2 N Part 1- Qualitative Thematic Maps (13 points) Answer the quest.pdf
 
1- Which program step combines separately-compiled object files in the.pdf
1- Which program step combines separately-compiled object files in the.pdf1- Which program step combines separately-compiled object files in the.pdf
1- Which program step combines separately-compiled object files in the.pdf
 
1- Which one of the following statements is incorrect- a)Trade unions.pdf
1- Which one of the following statements is incorrect- a)Trade unions.pdf1- Which one of the following statements is incorrect- a)Trade unions.pdf
1- Which one of the following statements is incorrect- a)Trade unions.pdf
 
1- Outline and describe the two (2) checkpoints that determine the fat.pdf
1- Outline and describe the two (2) checkpoints that determine the fat.pdf1- Outline and describe the two (2) checkpoints that determine the fat.pdf
1- Outline and describe the two (2) checkpoints that determine the fat.pdf
 

Recently uploaded

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 

Recently uploaded (20)

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 

1- Integrity ensures that only authorized users can view the informati.pdf

  • 1. 1. Integrity ensures that only authorized users can view the information* True False 2. RootKit is a set of software tools that break into a PC, obtain special privileges and then hide all traces of its existence.* True False 3. Script Kiddies download and run hacking programs without understanding technology* True False 4. Backdoors allow the attacker to return to the PC at a later time and bypass any security settings.* True False 5. Virus self replicate without user interaction* True False 6. Universally Connected Devices is an attacks which can come from anywhere* True False 7. Cyber Terrorists highly motivated, less likely to take risks, better funded, more determined than hackers* True False 8. Macro Virus lie dormant until it is triggered by a specific logical event*
  • 2. True False 9. Vishing is a technique used by Social Engineers to scam people* True False 10. Worm self replicate with help from user.* True False 11. Resident Virus is a program that advertises one activity but performs some other malicious activity.* True False 12. Confidentiality ensures that data is NOT altered* True False 13.Social Engineering relies on tricking and deceiving someone to provide secure information* True False 14. Zero Day Attack is an Attack which occurs when an attacker exploits a previously unknown flaw* True False 15. Spies are knowledgeable techies hired to hack specific systems (hired gun slingers)* True