While sending a document online, which security goal focuses on keeping it hidden from others A Data availability always B
Continue readingAuthor: Study Clue
Chapter 9: Cyber Security (Set-1)
Which statement best explains why cyber security is needed in daily computer use A To increase screen size B To
Continue readingChapter 8: Cyber Threats (Set-5)
A security weakness that is publicly known but not yet fixed on your device is mainly called A Strong password
Continue readingChapter 8: Cyber Threats (Set-4)
A file that pretends to be “invoice.pdf” but is actually “invoice.pdf.exe” is most likely A Safe PDF export B Normal
Continue readingChapter 8: Cyber Threats (Set-3)
A program that quietly opens secret access for an attacker is commonly called a A Disk cleanup utility B Screen
Continue readingChapter 8: Cyber Threats (Set-2)
When many infected devices are controlled together by an attacker, it is called a A Safe backup group B Botnet
Continue readingChapter 8: Cyber Threats (Set-1)
Malware is best described as software that is made to A Improve device speed B Increase screen brightness C Organize
Continue readingChapter 7: Internet and Internet Terminology (Set-5)
When DNS returns an old IP because of stored results, the setting that controls how long it stays valid is
Continue readingChapter 7: Internet and Internet Terminology (Set-4)
While typing a website, your browser suggests older addresses mainly using A Browser history database B Cached images folder C
Continue readingChapter 7: Internet and Internet Terminology (Set-3)
When a website name is typed, the readable name is converted into numbers using A DNS translation service B Screen
Continue reading