FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What is one thing that James can do to be sure he is practicing cyber-safety?
A
He should never harass others on Internet.
B
He should use the same secure password for all social media accounts.
C
He should only connect to networks that he knows are secured
D
He should never disclose personal information.
Explanation: 

Detailed explanation-1: -What is one thing that James can do to be sure he is practicing cyber-safety? He should never harass others on Internet.

Detailed explanation-2: -Cyber safety is the safe and responsible use of information and communication technology. It is about keeping information safe and secure, but also about being responsible with that information, being respectful to other people online, and using good Internet etiquette.

Detailed explanation-3: -These cyber security principles are grouped into four key activities: govern, protect, detect and respond.

Detailed explanation-4: -Cybersecurity founded on 3 pillars: Technology, process, and people.

Detailed explanation-5: -The aim of cybersecurity is to ensure that the confidentiality, integrity, and availability of data and systems is preserved.

There is 1 question to complete.