Description : A kind of impersonation in order to get access to other computers is__________ A. Hacking B. Spam C. Phishing D. Spoofing
Last Answer : D. Spoofing
Description : Which among the following is correct about "Hacking": a) Hacking is an illegal intrusion into a computer system and/or network. b) Cracking term is equivalent to Hacking (In Indian Laws perspective there is ... their own account followed by withdrawal of money. e) All of the Above f) None of These
Last Answer : e) All of the Above
Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These
Last Answer : a) Hacking
Description : This is a term for the number of times that user click on links in a message or on a website : it is much higher for legitimate marketing emails that for spam. A. personalization B. spamming C. CTR D. spoofing
Last Answer : C. CTR
Description : A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called? a. Phishing b. Carding c. Brand spoofing d. All of the above
Last Answer : d. All of the above
Description : ____________ is when the criminal disseminates the information to defame you and take revenge on you, or cause loss. A. Cyber attack B. Cyber defamation C. Spoofing’ D. Phisking
Last Answer : B. Cyber defamation
Description : Exploration of a phone network without authorization is known as a. Scripting b. Phreaking c. Phone hacking d. Call tracing
Last Answer : b. Phreaking
Description : The common name for the crime of stealing - passwords is a. Hacking b. Spoofing c. Identity theft d. Cracking
Last Answer : b. Spoofing
Description : 8. The common name for the crime of stealing passwords is a. Hacking b. Spoofing c. Identity theft d. Cracking
Description : The common name for the crime of stealing passwords is i) Jacking ii) Identify Theft iii) Spoofing iv) Hacking
Last Answer : iii) Spoofing
Description : The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? a. hacking b. cracking c. dumpster diving d. spoofing
Last Answer : d. spoofing
Description : Which one is a logical threat? a. Hacking b. Storm c. Phishing d. None of the above
Last Answer : a. Hacking
Description : Which one is not a physical threat? a. Hacking b. Storm c. Phishing d. None of the above
Description : What does an authorization profile in an AS ABAP based SAP system contains? A. collection of authorizations B. The user menu C. Profile parameters, such as the password ... (login/password_expiration_time) D. The collection of the authorizations checks that a user has passed successfully
Last Answer : A. collection of authorizations
Description : What is it called when a hacker pretends to be a valid user on the system? A. Impersonation B. Third-person authorization C. Help desk D. Valid user
Last Answer : A. Impersonation
Description : According to implied ' warranty as to quiet possession' it is presumed that the buyer shall have the A. Peaceful possession of the goods. B. Right to use the goods as an owner. C. Both D. None of these
Last Answer : C. Both
Description : A sold a stolen car to B which was subsequently recovered by the police form B's possession and he (B) was forced to return the same to the true owner. Here, there is breach of implied condition as to A. Merchantability B. Fitness for buyer's purpose C. Title D. None of these
Last Answer : C. Title
Description : Which phase/s of POP3 allow/s an user agent to retrieve the messages as well as to mark the messages for deletion purpose? a. Authorization Phase b. Transaction Phase c. Update Phase d. All of the above
Last Answer : b. Transaction Phase
Description : Pre incorporation contract is also known as _________ A. Provisional B. Preliminary C. Illegal D. Legal
Last Answer : A. Provisional
Description : Wagering Agreement is a _____________ agreement A. Valid B. Voidable C. Void D. Illegal
Last Answer : C. Void
Description : Anuj agrees to pay ` 10,000 to Manoj if a certain ship returns within a year. However, the ship sinks within the year. In this case, the contract becomes: A. Valid B. Void C. Voidable D. Illegal
Last Answer : B. Void
Description : In case of void agreements, collateral transactions are A. Also void B. Unenforceable C. Not affected D. Illegal
Last Answer : A. Also void
Description : _______searches through raw data on a hard drive without using a file system. A. Data mining B. Data carving C. Meta data D. Data Spoofing.
Last Answer : B. Data carving
Description : A ______________ is a set of interdependent organizations involved in the process of making a product or service available for use of consumption by the consumer or business user. A. retailer B. wholesaler C. distribution channel D. middleman
Last Answer : C. distribution channel
Description : When companies market products on the basis of what the product's attributes will do for a given segment of consumers, they are using a powerful form of behavioral segmentation known as: A. ... segmentation. B. benefit segmentation. C. user status segmentation. D. usage rate segmentation.
Last Answer : B. benefit segmentation.
Description : Is email hacking illegal?
Last Answer : Well considering it’s illegal to read someones mail without consent, I’m guessing the same is applied to email. I don’t know the exact law you are breaking by doing it, but I’m sure a lawyer could find something.
Description : Any data and instruction entered in the memory of a computer is__________ A. Storage B. Output C. Input D. Information
Last Answer : C. Input
Description : Strong AI is__________ A. The embodiment of human intellectual capabilities within a computer. B. A set of computer programs that produce output that would be considered to reflect intelligence if it were generated ... mental models implemented on a computer D. All of the above E. None of the above
Last Answer : A. The embodiment of human intellectual capabilities within a computer.
Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above
Last Answer : a. Encryption
Description : ______ is the art of exploiting the human elements to gain access to the authorized user. A. Social Engineering. B. IT Engineering. C. Ethical Hacking. D. None of the above.
Last Answer : A. Social Engineering.
Description : If a question is from a new user and the first answer is spam, don't you suspect that the OP is spam?
Last Answer : But of course.
Description : What is the difference between non-volatile memory and storage is that the memory is__________ and storage is_________.A. temporary, permanentB. permanent, temporaryC. slow, fastD. none of the above?
Last Answer : A
Description : The checksum of0000 and0000 is__________. A) 1111 B) 0000 C) 1110 D) 0111
Last Answer : 0111
Description : In the fluid catalytic cracker (FCC), the cracking reaction is __________ (i) and the regeneration is__________ (ii) __________. (A) (i) exothermic (ii) endothermic (B) (i) exothermic (ii) exothermic (C) (i) endothermic (ii) endothermic (D) (i) endothermic (ii) exothermic
Last Answer : (D) (i) endothermic (ii) exothermic
Description : Way to promote a business with social media is__________ * promotion of your company, services, and products SEO Digital media marketing potential clients to visit your website
Last Answer : SEO
Description : Way promote a business with social media is__________ A.your company, services, and products B.many contacts as possible C. Offer a lot of helpful D.potential clients to visit your website Answer: C
Last Answer : C. Offer a lot of helpful
Description : The purpose of all good small business strategy is__________. A. to increase turnover. B. to increase profitability. C. to achieve competitive advantage. D. to achieve stated objectives.
Last Answer : D. to achieve stated objectives.
Description : A dilemma is simple when the conclusion is__________ proposition. A) disjunctive B) implicative C) negative D) categorical
Last Answer : D) categorical
Description : “““.are 'attempts by individuals toobtain confidential information from you by falsifying their identity. (A) Phishing (B) Computer viruses (C) Spyware scams (D) Viruses (E) None of the above
Last Answer : Phishing
Description : _____are attempt by individuals to obtain confidential information from you by falsifying their identity: a) Phishing Trips b) Computer Viruses c) Spyware Scams d) Viruses e) Phishing Scams
Last Answer : a) Phishing Trips
Description : .....are attempts by individuals to obtain confidential information from you by falsifying their identity. 1) Phishing trips 2) Computer viruses 3) Spyware scams 4) Phishing Scams
Last Answer : 4) Phishing Scams
Description : .....are attempts by individuals to obtain confidential information from you by falsifying their identity. 1 Phishing trips 2 Computer viruses 3 Spyware scams 4 Phishing Scams
Last Answer : 4 Phishing Scams
Description : I kill people when you need me to, I am not accepted and illegal, I need to be refilled from time to time and i can harm my owner. What am I? -Riddles
Last Answer : A gun.
Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software
Last Answer : b. Public key encryption
Description : According to the text, the most common mistake that prevents evidence seized from Being admitted is: a. Uninformed consen b. Forcible entry c. Obtained without authorization d. None of the above
Last Answer : c. Obtained without authorization
Description : What is spoofing and sniffing ?
Last Answer : For hackers and criminals, these are two more ways in which they illegally infiltrate a computer system. 'Spoofing' has become increasingly popular as a common method of manipulating financial information ... almost impossible to detect. So data encryption is the only way to protect against it.
Description : What is used to see if a client is still connected to a NetWare server? A. Spoofing TCP/SAP B. Watchdog packet C. GNS Round Robin D. DNS Round Robin
Last Answer : Watchdog packet
Description : In the email campaign, __________ delivers the advertisements into the group of targeted customers. a. Spoofing b. Indirect email marketing c. Direct email marketing d. Spamming
Last Answer : c. Direct email marketing