Data and Privacy – MCQ’s
- Which of the following doesn’t include the type of software piracy?
(a) Softlifting
(b) liability ✓
(c) client server overuse
(d) online piracy
- Which of the following is not a cybercrime?
(a) Hacking
(b) phishing crime
(c) identity theft
(d) decryption ✓
- Which of the following is not the characteristics of phishing emails?
(a) Official data breach notification
(b) email account update
(c) IT reminder ✓
(d) similar domain of actual website
- Which of the following is not a characteristics of phishing website?
(a) Similar domain of actual website
(b) using of forms to collect visitors
(c) Actual link to web content ✓
(d) email account updates
- Which of the following is not a characteristic of a good password?
(a) Is eight characters long?
(b) Doesn’t contain username
(c) Contains uppercase letters
(d) Password is your name only ✓
- Making illegal copies of software is called:
(a) Stolen
(b) phishing crime
(c) identity theft
(d) piracy ✓
- Which is the general term for any type of information processing that can be represented mathematically?
(a) Computation ✓
(b) liability
(c) client server overuse
(d) online piracy
- Which is the process of encoding data?
(a) Service
(b) online banking
(c) client
(d) encryption ✓
- When a key has less number of character than the text to encrypt, then repeating letters of the key is called:
(a) Interim ciphertext ✓
(b) cyber
(c) client server overuse
(d) online piracy
- Which is a cyber-attack to make machine or network resource unavailable for a user?
(a) Softlifting
(b) liability
(c) denial of service ✓
(d) online piracy
- CAPTCHA stands for:
(a) Completely automated public Turing ✓
(b) Literally automated
(c) automated public Turing
(d) Automated
- Every organization to whom the data is entrusted, it is their responsibility regarding ____ of the data.
(a) Confidentiality
(b) privacy
(c) online privacy
(d) confidentiality and privacy ✓
- Which is called borrowing and installing a copy of a software application from a colleague?
(a) Softlifting ✓
(b) liability
(c) denial of service
(d) online piracy
- Which is installing more copies of the software than you have license for?
(a) Internet cyber text
(b) cyber
(c) client server overuse ✓
(d) online piracy
- Which means installing and selling unauthorized copies of software on refurbished or new computers?
(a) Confidentiality
(b) privacy
(c) online privacy
(d) hard-disk loading ✓
- Which is called duplicating and selling copyrighted programs?
(a) Service
(b) counterfeiting ✓
(c) client
(d) encryption
- Using computer for the purpose of some unauthorized activities is called:
(a) Fraud or misuse ✓
(b) selling and printing
(c) denial of service
(d) piracy
- Promises made by a software developer is known as warranty or:
(a) Confidentiality
(b) service
(c) liability ✓
(d) loading
- Which can protect an idea so that it won’t be misuse and the owner will attain its full rights?
(a) Hacking
(b) patent ✓
(c) identity theft
(d) decryption
- To protect value and usefulness we may imply:
(a) Trade secrets ✓
(b) cyber
(c) client server overuse
(d) online piracy
- The computer can be attacked while sitting remotely, in this way sensitive information will be:
(a) Hacking
(b) sabotaged ✓
(c) identity theft
(d) decryption
- Encoding means conversion of the data to an unreadable format which is called:
(a) Ciphertext ✓
(b) online banking
(c) client
(d) encryption
- Which is used to read the ciphertext?
(a) Key ✓
(b) board
(c) mouse
(d) trackball
- Which are used for authentication to enter a system?
(a) Hacking
(b) sabotaged
(c) passwords ✓
(d) decryption
- A crime in which computer network or devices are used is called a:
(a) Lefting
(b) phishing crime
(c) identity theft
(d) cybercrime ✓
- Illegally accessing someone else’s computer is called:
(a) Hacking ✓
(b) sabotaged
(c) passwords
(d) decryption
- The foundation of all security systems is formed on:
(a) Ethical principles ✓
(b) formal principles
(c) principles
(d) outline
- Which is the illegal copying, distribution, or usage of software?
(a) Service
(b) online banking
(c) client
(d) software piracy ✓
- Some software companies sell software with a confidential text, called the:
(a) Key ✓
(b) privacy
(c) software
(d) phishing
- Typically involves downloading illegal software:
(a) Lefting
(b) phishing crime
(c) identity theft
(d) online piracy ✓
- Some malicious user disguises himself as our friend and tries to get some confidential information:
(a) Lefting
(b) phishing ✓
(c) identity theft
(d) online piracy
- Which is a way to protect an idea?
(a) Patent ✓
(b) online banking
(c) client
(d) software piracy
- Which are usually the secrets that are playing an important role for the success of a company?
(a) Trade secrets ✓
(b) cyber
(c) client server overuse
(d) online piracy
- Which is a serious attack on a computer system?
(a) Hacking
(b) sabotage ✓
(c) passwords
(d) decryption
- A____ is a computer program written with negative intentions:
(a) Patent
(b) virus ✓
(c) client
(d) software piracy
- NADRA stands for:
(a) National database and registration authority ✓
(b) National database resolution
(c) Registration authority
(d) National drugs registration
- Which means that we want to keep the data correct?
(a) Integrity ✓
(b) cyber
(c) client server overuse
(d) online piracy
- Which means that we want to have access to the data when we want?
(a) Patent
(b) availability ✓
(c) client
(d) software piracy
- Companies want to read minds of Web surfers and sometimes they store some piece of information with the Web Surfer, called:
(a) Integrity
(b) cyber
(c) cookies ✓
(d) online piracy
- Using ____ companies are able to track purchases and gather personal data:
(a) Data
(b) information
(c) cookies ✓
(d) online piracy
- Which is the process of encoding data in such a way that only authorized person can read it?
(a) Service
(b) counterfeiting
(c) client
(d) encryption ✓
- A computer expert who can steal data when it moves from one location to other, is called:
(a) Hacker ✓
(b) sabotaged
(c) passwords
(d) decryption
- Which methods are the methods of encryption in which the characters of original text are replaced by some other characters?
(a) Service
(b) counterfeiting
(c) client
(d) substitution cipher ✓
- Caesar was a Roman politician and military general who played a critical role in the rise of the:
(a) Asia Empire
(b) Roman empire ✓
(c) American Empire
(d) Pakistani Empire
45 in Roman Empire ____ method is used this method of encryption for sending messages to his soldiers and generals:
(a) Service
(b) online banking
(c) client
(d) Caesar ✓
- In which method, we replace each alphabet in the plain text by another alphabet:
(a) Integrity
(b) cyber
(c) Caesar Cipher ✓
(d) privacy
- Vigenere cipher is another substitution cipher, which uses a table known as:
(a) Vigenere cipher table ✓
(b) simple table
(c) Complex table
(d) round table
- In this method, we have a substitution key that is combined with the plain text to generate the ciphertext:
(a) Vigenere Cipher method ✓
(b) simple method
(c) simplex method
(d) round method
- Cryptographic keys are used to read a _____ message.
(a) Double
(b) right
(c) center
(d) encrypted ✓
- Which attackers often target web servers of high-profile organizations such as banking, commerce, and media companies, or Government and trade organizations?
(a) Service
(b) dos ✓
(c) client
(d) substitution cipher