1) What is the full form of CIA under information security?
Correct Answer: Confidentiality Integrity Availability
2) What is called periodic assessment of security vulnerability in computer system?
Correct Answer: Security audit
3) What is called a single point of access for several networking services?
Correct Answer: Directory service
4) Which activities endanger the sovereignty and integrity of nation?
Correct Answer: Cyber Terrorism
5) Which crime involves the use of computer networks to create, distribute or access materials that sexually exploit underage persons?
Correct Answer: Child pornography