QuestionJune 23, 2025

II. Choice part 9 __ is people who use internet to exploit younger for sexual A. Cyber bullying B Cyber predator C .Phishing D. All 10.which of the following is stoping regular user from connecting to the service? A. Denial of service B. Virus C.Keylogger D. Worms 11. Which of the following is protecting computer system on network? A. Information B Cyber security C Fire D.Worms 12. __ is enables authorised user to acess infn without any interference? A. Confidentiality B Intgrity C.Data D . Avialibility 13. __ is recording the movement on keyboard and stealing password? A. Trojan horse B Adware C Keylogger D. Phishing 14. Which of the following is not artificail threats A Botrets B. Fire C. Temprature D all 15. There are __ type of computer security A.3 B.5 C. 4 D.2

II. Choice part 9 __ is people who use internet to exploit younger for sexual A. Cyber bullying B Cyber predator C .Phishing D. All 10.which of the following is stoping regular user from connecting to the service? A. Denial of service B. Virus C.Keylogger D. Worms 11. Which of the following is protecting computer system on network? A. Information B Cyber security C Fire D.Worms 12. __ is enables authorised user to acess infn without any interference? A. Confidentiality B Intgrity C.Data D . Avialibility 13. __ is recording the movement on keyboard and stealing password? A. Trojan horse B Adware C Keylogger D. Phishing 14. Which of the following is not artificail threats A Botrets B. Fire C. Temprature D all 15. There are __ type of computer security A.3 B.5 C. 4 D.2
II. Choice part
9 __ is people who use internet to exploit younger for sexual
A. Cyber bullying B Cyber predator C .Phishing D. All
10.which of the following is stoping regular user from connecting to the service?
A. Denial of service B. Virus C.Keylogger D. Worms
11. Which of the following is protecting computer system on network?
A. Information B Cyber security C Fire D.Worms
12. __ is enables authorised user to acess infn without any interference?
A. Confidentiality B Intgrity C.Data D . Avialibility
13. __ is recording the movement on keyboard and stealing password?
A. Trojan horse B Adware C Keylogger D. Phishing
14. Which of the following is not artificail threats A Botrets B. Fire C. Temprature D all
15. There are __ type of computer security A.3 B.5
C. 4 D.2

Solution
3.8(285 votes)

Answer

9. B. Cyber predator ### 10. A. Denial of service ### 11. B. Cyber security ### 12. D. Availability ### 13. C. Keylogger ### 14. B. Fire ### 15. A. 3 Explanation 1. Identify the term for exploiting younger people online Cyber predator is the term used for individuals who exploit younger people for sexual purposes online. 2. Determine what stops regular users from connecting to a service Denial of service (DoS) attacks prevent regular users from accessing services by overwhelming the system. 3. Identify what protects computer systems on a network Cyber security involves protecting computer systems and networks from digital attacks. 4. Define what enables authorized access without interference Availability ensures that authorized users can access information without interference. 5. Recognize what records keyboard movements and steals passwords Keylogger is software or hardware that records keystrokes to steal passwords and other sensitive information. 6. Identify non-artificial threats Fire and temperature are natural threats, not artificial ones like botnets. 7. Determine the number of types of computer security There are 3 main types of computer security: physical, network, and data security.

Explanation

1. Identify the term for exploiting younger people online<br /> Cyber predator is the term used for individuals who exploit younger people for sexual purposes online.<br /><br />2. Determine what stops regular users from connecting to a service<br /> Denial of service (DoS) attacks prevent regular users from accessing services by overwhelming the system.<br /><br />3. Identify what protects computer systems on a network<br /> Cyber security involves protecting computer systems and networks from digital attacks.<br /><br />4. Define what enables authorized access without interference<br /> Availability ensures that authorized users can access information without interference.<br /><br />5. Recognize what records keyboard movements and steals passwords<br /> Keylogger is software or hardware that records keystrokes to steal passwords and other sensitive information.<br /><br />6. Identify non-artificial threats<br /> Fire and temperature are natural threats, not artificial ones like botnets.<br /><br />7. Determine the number of types of computer security<br /> There are 3 main types of computer security: physical, network, and data security.
Click to rate:

Similar Questions