www.ITISkill.com
Home
CYBER SECURITY - Quiz
Categories
Computer Operator and Programming Assistant (COPA)
CYBER SECURITY
1) What is called the unauthorized control/acess over the computer system and destroys the data?
Defamation
Carding
Hacking
Cyber - stalking
2) Which method go through all the files or network elements with an intention to detect something unusual?
Probing
Phishing
Infecting
Scanning
Submit Quiz