COMPUTER THREATS SECURITY
COMPUTER SECURITY POLICIES EXAMPLES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
If you don’t own the network you can do what you want on it including breaking the law.
|
False
|
|
True
|
|
Either A or B
|
|
None of the above
|
Explanation:
Detailed explanation-1: -Illegal access is defined to include only computer hacking, theft, robbery, burglary and bribery.
Detailed explanation-2: -5) Thou shalt not use a computer to bear false witness: This means that if you give false information through a computer, this is unethical. For example, obtaining somebody elses computer login name and password and using it is unethical.
There is 1 question to complete.