1. An attack to the network or the computer system by some person with authorized system access is known as ____________ attack. a)Insider b)External c)Both a) and b) d)Semi structured 2. Three of the primary concepts in information security are confidentiality, integrity, and __________. a) Authentication b) Availability c) Encryption d) Decryption 3. In internet terminology IP means _________________. a) Internet Provider b) Internet Processor c) Internet Protocol d) Internet Procedure 4. What is an antivirus? a) A bigger and more dangerous virus b) Software used to duplicate viruses c) Computer software used to prevent, detect and remove malicious software d) A biological agent that reproduces itself inside the cells of living things 5. __________monitors user activity on internet and transmit that information in the background to someone else a) Malware b) Spyware c) Adware d) None of the above Which of the following is not an external threat to a computer or computer network A.Ignorance B.Trojan horses C.Adware D.Crackers ANSWER: A When a person is harrassed repeatedly by being followed then he or she is targeted of A.Bullying B.Stalking C.Identity theft D.Phishing ANSWER: B Which of the following is a class of computer threat A.Phishing B.Soliciting C.DoS attacks D.Stalking ANSWER: C Name the program or hardware device that filters the information coming through an internet connection to a network A.Antivirus B.Cookies C.Firewall D.Cybersafety ANSWER: C It allows a visited website to store its information about a user on the users computer A.Spam B.Cookies C.Malware D.Adware ANSWER: B Name the method of stealing ideas or creation of others A.Plagiarism B.IPR C.Piracy D.All the above ANSWER: D Exploring appropriate and ethical behavious related to online environments and digital media A.Cyber ethics B.Cyber security C.Cyber safety D.Cyber law ANSWER: A Identify the virus that use the techniques of writing virus code within empty or unused space within the file A.Cavity viruses B.nonresident viruses C.Resident viruses D. Trojan ANSWER: A