Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
Multiple Choice
A) It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software.
B) It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source.
C) It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.
D) It refers to a seemingly tempting, but bogus target meant to draw hacking attempts.
E) It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Lack of technology to identify the origin of a security attack
B) Non-recognition of commission of a security-related crime
C) Unwillingness of developed countries to share technical know-how with lesser-developed countries
D) Non-existent extradition agreements between two countries
E) Technological incompatibility between the two countries
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) DDos
B) Rootkit
C) Keylogging
D) CAPTCHa
E) VPN
Correct Answer
verified
Multiple Choice
A) Audit trails
B) Intrusion detection tools
C) Access control tools
D) User-tracking tools
E) Network watching tools
Correct Answer
verified
Multiple Choice
A) Sloppy programming practices where software developers do not validate user input
B) Lack of in-built anti-virus features
C) Irregular auditing of Web site content
D) Ease of infiltrating the Web site
E) Non-employment of encryption techniques
Correct Answer
verified
Multiple Choice
A) Phishing
B) Social engineering
C) Password theft
D) Virus infections
E) Physical threats
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Cyber-fraud
B) Corporate espionage
C) Carrying out technology disruptions
D) Extortion
E) Illegal funds transfer
Correct Answer
verified
Multiple Choice
A) overlamination processes
B) biometrics
C) smart tags
D) bio-embedded systems
E) holographs
Correct Answer
verified
Showing 21 - 40 of 87
Related Exams