Online Test      LOGIN      SIGN UP
Forgot your password?
  • Computer Practice Computer Awareness Study Material

Digitization help student to explore and study their academic courses online, as this gives them flexibility and scheduling their learning at their convenience. Kidsfront has prepared unique course material of Computer Awareness Computer and Data Security for Computer Practice student. This free online Computer Awareness study material for Computer Practice will help students in learning and doing practice on Computer and Data Security topic of Computer Practice Computer Awareness. The study material on Computer and Data Security, help Computer Practice Computer Awareness students to learn every aspect of Computer and Data Security and prepare themselves for exams by doing online test exercise for Computer and Data Security, as their study progresses in class. Kidsfront provide unique pattern of learning Computer Awareness with free online comprehensive study material and loads of Computer Practice Computer Awareness Computer and Data Security exercise prepared by the highly professionals team. Students can understand Computer and Data Security concept easily and consolidate their learning by doing practice test on Computer and Data Security regularly till they excel in Computer Awareness Computer and Data Security.


Computer and Data Security
Which of the following consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

a) Threat
b) Network Security
c) Vulnerability
d) None of these



Answer
Correct Answer Is : Network Security
Solution Is :
Most computer security measures

a) Encryption
b) Password
c) Both a and b
d) None of these



Answer
Correct Answer Is : Both a and b
Solution Is :
The information that can be erased or become inaccessible is known as

a) Loss of confidentiality
b) Loss of security
c) Loss of availability
d) None of these



Answer
Correct Answer Is : Loss of availability
Solution Is :
Which of the following is the weakness of data security.

a) Secrecy
b) Vulnerability
c) Privacy
d) All of these



Answer
Correct Answer Is : Vulnerability
Solution Is :
How many goals are in Computer Security.

a) 2_
b) 3_
c) 4_
d) 5_



Answer
Correct Answer Is : 3_
Solution Is :
Which of the following are the goals of computer security.

a) Availability
b) Confidentiality
c) Integrity
d) All of these



Answer
Correct Answer Is : All of these
Solution Is :
Weaknesses can appear in which part of computer component.

a) Hardware
b) Operating System
c) Software
d) All of these



Answer
Correct Answer Is : All of these
Solution Is :
When information is read or copied by someone not authorized to do so, the result is known as

a) Loss of confidentiality
b) Integrity
c) Availability
d) None of these



Answer
Correct Answer Is : Loss of confidentiality
Solution Is :
Which ensures that computer related assets are accessed only by authorized parties.

a) Confidentiality
b) Integrity
c) Availability
d) None of these



Answer
Correct Answer Is : Confidentiality
Solution Is :
Confidentiality is sometimes called

a) Secrecy
b) Privacy
c) Both a and b
d) None of these



Answer
Correct Answer Is : Both a and b
Solution Is :

Preparation for Exams

script type="text/javascript">