371. Which of the following enables to determine how often a user visited a Website?
  A.  Phish
  B.  Spammer
  C.  Hacker
  D.  Identify theft
     
   
View Answer


372. A person who uses his or her expertise to gain access to other people computers to get information illegally or do damage is a Or A person who uses his expertise for software?
  A.  All of these
  B.  instant messenger
  C.  spammer
  D.  hacker
     
   
View Answer


373. What is a person called who uses a computer to cause harm to people or destroy critical systems?
  A.  Cyber Cracker
  B.  Black-hat-Hacker
  C.  Cyber Terrorist
  D.  Hacktivist
     
   
View Answer


374. ......... are attempts by individuals to obtain confidential information from you by falsifying their identity.
  A.  Computer viruses
  B.  Phishing trips
  C.  Spyware scams
  D.  Viruses
     
   
View Answer


375. Which of the following is a criminal activity attempting to acquire sensitive information such as passwords, credit cards, debits by masquerading as a trustworthy person or business in an electronic communication?
  A.  Hacking
  B.  Stalking
  C.  Spoofing
  D.  Phishing
     
   
View Answer


376. All of the following are examples of real-security and privacy risks except
  A.  spam
  B.  hackers
  C.  viruses
  D.  identify theft
     
   
View Answer


377. Junk E-mail is also called
  A.  sniffer script
  B.  spoof
  C.  spam
  D.  spool
     
   
View Answer


378. A digital signature is an
  A.  signature in binary form
  B.  encrypting information
  C.  scanned signature
  D.  handwritten signature
     
   
View Answer


379. To protect yourself from computer hacker intrusions, you should install a
  A.  script
  B.  macro
  C.  mailer
  D.  firewall
     
   
View Answer


380. Which one of the following is a key function of firewall?
  A.  Copying
  B.  Deleting
  C.  Monitoring
  D.  Moving
     
   
View Answer


Copyright © 2020-2022. All rights reserved. Designed, Developed and content provided by Anjula Graphics & Web Desigining .