A kind of impersonation in order to get access to other computers is__________ A. Hacking
B. Spam
C. Phishing
D. Spoofing

1 Answer

Answer :

D. Spoofing

Related questions

Description : Illegal intrusion of a computer system without authorization of the owner or user is__________ A. Hacking B. Spam C. Phishing D. Spoofing

Last Answer : A. Hacking

Description : A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called? a. Phishing b. Carding c. Brand spoofing d. All of the above

Last Answer : d. All of the above

Description : ____________ is when the criminal disseminates the information to defame you and take revenge on you, or cause loss. A. Cyber attack B. Cyber defamation C. Spoofing’ D. Phisking

Last Answer : B. Cyber defamation

Description : The common name for the crime of stealing - passwords is a. Hacking b. Spoofing c. Identity theft d. Cracking

Last Answer : b. Spoofing

Description : 8. The common name for the crime of stealing passwords is a. Hacking b. Spoofing c. Identity theft d. Cracking

Last Answer : b. Spoofing

Description : The common name for the crime of stealing passwords is i) Jacking ii) Identify Theft iii) Spoofing iv) Hacking

Last Answer : iii) Spoofing

Description : The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? a. hacking b. cracking c. dumpster diving d. spoofing

Last Answer : d. spoofing

Description : This is a term for the number of times that user click on links in a message or on a website : it is much higher for legitimate marketing emails that for spam. A. personalization B. spamming C. CTR D. spoofing

Last Answer : C. CTR

Description : Which one is a logical threat? a. Hacking b. Storm c. Phishing d. None of the above

Last Answer : a. Hacking

Description : Which one is not a physical threat? a. Hacking b. Storm c. Phishing d. None of the above

Last Answer : a. Hacking

Description : What is the attack called “evil twin” a) Rogue access point b) ARP poisoning c) Session hijacking d) MAC spoofing

Last Answer : a) Rogue access point

Description : What is the attack called “evil twin”?  Rogue access point  ARP poisoning  Session hijacking  MAC spoofing

Last Answer :  MAC spoofing

Description : Have you seen the very funny Prince impersonation Diet Dr. Pepper commercial?

Last Answer : Well it looks like there’s a whole string of these little clips done by someone called “Lil’ Sweet.” I just caught the one about the playhouse. Pretty funny.

Description : What is it called when a hacker pretends to be a valid user on the system? A. Impersonation B. Third-person authorization C. Help desk D. Valid user

Last Answer : A. Impersonation

Description : What is the difference between non-volatile memory and storage is that the memory is__________ and storage is_________.A. temporary, permanentB. permanent, temporaryC. slow, fastD. none of the above?

Last Answer : A

Description : Any data and instruction entered in the memory of a computer is__________ A. Storage B. Output C. Input D. Information

Last Answer : C. Input

Description : The checksum of0000 and0000 is__________. A) 1111 B) 0000 C) 1110 D) 0111

Last Answer : 0111

Description : In the fluid catalytic cracker (FCC), the cracking reaction is __________ (i) and the regeneration is__________ (ii) __________. (A) (i) exothermic (ii) endothermic (B) (i) exothermic (ii) exothermic (C) (i) endothermic (ii) endothermic (D) (i) endothermic (ii) exothermic

Last Answer : (D) (i) endothermic (ii) exothermic

Description : Way to promote a business with social media is__________ *  promotion of your company, services, and products  SEO  Digital media marketing  potential clients to visit your website

Last Answer :  SEO

Description : Way promote a business with social media is__________ A.your company, services, and products B.many contacts as possible C. Offer a lot of helpful D.potential clients to visit your website Answer: C

Last Answer : C. Offer a lot of helpful

Description : The purpose of all good small business strategy is__________. A. to increase turnover. B. to increase profitability. C. to achieve competitive advantage. D. to achieve stated objectives.

Last Answer : D. to achieve stated objectives.

Description : Strong AI is__________ A. The embodiment of human intellectual capabilities within a computer. B. A set of computer programs that produce output that would be considered to reflect intelligence if it were generated ... mental models implemented on a computer D. All of the above E. None of the above

Last Answer : A. The embodiment of human intellectual capabilities within a computer. 

Description : A dilemma is simple when the conclusion is__________ proposition. A) disjunctive B) implicative C) negative D) categorical 

Last Answer : D) categorical 

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : What is the first phase of hacking? A. Attack B. Maintaining access C. Gaining access D. Reconnaissance E. Scanning

Last Answer : D. Reconnaissance

Description : What is the first phase of hacking? A. Attack B. Maintaining access C. Gaining access D. Reconnaissance E. Scanning

Last Answer : D. Reconnaissance

Description : . What is the first phase of hacking? A. Attack B. Maintaining access C. Gaining access D. Reconnaissance

Last Answer : D. Reconnaissance

Description : What is the first phase of hacking?  Maintaining access  Gaining access  Reconnaissance  Scanning

Last Answer :  Scanning

Description : Social engineering the ____ of exploiting the human elements to gain access to unauthorized resources. a. Art b. Science c. Hacking d. Skill

Last Answer : a. Art

Description : Identifying weakness in computer system or network to exploit its weaknesses to gain access is known as a. Cracking b. Cybersecurity c. Hacking d. Threatening

Last Answer : c. Hacking

Description : Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking. a. Local networking b. Social engineering c. Physical entry d. Remote networking

Last Answer : d. Remote networking

Description : What is the first phase of hacking? a. Attack b. Maintaining access c. Gaining access d. Reconnaissance e. Scanning

Last Answer : e. Scanning

Description : what is the first phase of hacking (a) attack (b) maintaining access (c) gaining access (d) reconnaissance

Last Answer : (d) reconnaissance

Description : ______ is the art of exploiting the human elements to gain access to the authorized user. A. Social Engineering. B. IT Engineering. C. Ethical Hacking. D. None of the above.

Last Answer : A. Social Engineering.

Description : What is the first phase of hacking? A. Attack B. Maintaining access C. Gaining access D. Reconnaissance E. Scanning

Last Answer : D. Reconnaissance

Description : What is the first phase of hacking? ∙ A. Attack ∙ B. Maintaining access ∙ C. Gaining access ∙ D. Reconnaissance

Last Answer : D. Reconnaissance

Description : What are some movies about computers and hacking?

Last Answer : Sneakers Fun movie; all-star cast. It was sort of sad watching Gandhi play the villain though.

Description : How Hacking computers?

Last Answer : Hacking a computer is possible through the use of primitivecomputer programs. Machine to another, rapidly infecting hundredsof computers in a short time.

Description : Ethical Issues in Digital Forensic means : a. Set of moral principals that regulate the use of computers b. Related to ethical hacking c. Honesty towards investigation d. Compliance with law

Last Answer : a. Set of moral principals that regulate the use of computers

Description : Which among the following is wrong characteristic of "Phishing": a) Fakers, by offering special rewards or money prize etc asked for personal information such as passwords, credit card information, social ... purpose is theft or misuse the acquired material c) Both of Above d) None of These

Last Answer : d) None of These

Description : Which among the following is wrong characteristic of "Phishing": a) Fakers, by offering special rewards or money prize etc asked for personal information such as passwords, credit card information, social ... purpose is theft or misuse the acquired material c) Both of Above d) None of These

Last Answer : d) None of These

Description : Sun Lab’s Java Car uses ....... technology to keep your car networked with the world outside. (1) embedded (2) spam (3) smart Screen(4) access Point

Last Answer : embedded

Description : As per section 2, sub section 7 every kind of moveable property other than actionable Claim and money is called A. Goods B. Future goods C. Both (a) and (b) D. None of above

Last Answer : A. Goods

Description : Does this look like slave computers making spam were run through my domain email accounts?

Last Answer : The only part of your question I have experience with is getting emails from yourself. If you’re getting them, I’d be willing to bet that other people you have in your contacts/address book are getting them too, and your email addy has been compromised.

Description : What is spoofing and sniffing ?

Last Answer : For hackers and criminals, these are two more ways in which they illegally infiltrate a computer system. 'Spoofing' has become increasingly popular as a common method of manipulating financial information ... almost impossible to detect. So data encryption is the only way to protect against it.

Description : What is used to see if a client is still connected to a NetWare server? A. Spoofing TCP/SAP B. Watchdog packet C. GNS Round Robin D. DNS Round Robin

Last Answer : Watchdog packet

Description : In the email campaign, __________ delivers the advertisements into the group of targeted customers. a. Spoofing b. Indirect email marketing c. Direct email marketing d. Spamming

Last Answer : c. Direct email marketing

Description : In which type of email campaige, advertisment are sent to target group of customer? A. Direct email marketing B. Indirect email marketing C. Spamming D. spoofing

Last Answer : A. Direct email marketing