Description : A kind of impersonation in order to get access to other computers is__________ A. Hacking B. Spam C. Phishing D. Spoofing
Last Answer : D. Spoofing
Description : Illegal intrusion of a computer system without authorization of the owner or user is__________ A. Hacking B. Spam C. Phishing D. Spoofing
Last Answer : A. Hacking
Description : _________- is a prefix to everything that transports us instantly into the virtual world. A. Cyber B. Internet C. Tech D. None of the above
Last Answer : A. Cyber
Description : Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________ a) State sponsored hackers b) Blue Hat Hackers c) Cyber Terrorists d) Red Hat Hackers
Last Answer : c) Cyber Terrorists
Description : What is the attack called “evil twin” a) Rogue access point b) ARP poisoning c) Session hijacking d) MAC spoofing
Last Answer : a) Rogue access point
Description : What is the attack called “evil twin”? Rogue access point ARP poisoning Session hijacking MAC spoofing
Last Answer : MAC spoofing
Description : The term used to describe a terrorist attack on a computer information system is- a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the these
Last Answer : b. Cyber Terrorism
Description : The term used to describe a terrorist attack on a computer information system is a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the these
Description : A minor was facing a criminal prosecution for smuggling drugs. He borrowed Rs. 5000 to hire an advocate to defend him in the court of law. What is the remedy available to the creditor if the ... the age of majority D. The creditor can recover his amount from the parent or guardian of the minor
Last Answer : A. The creditor cannot recover the amount from the minor since a contract with a minor is void ab initio
Description : An acute disease becomes _____ when the body is incapable of ridding itself of the pathogen, while a local disease becomes ______ when it disseminates to deeper organs and tissues. a. Contagious; Systemic b. Contagious; Secondary c. Chronic; Systemic d. Chronic; Secondary
Last Answer : c. Chronic; Systemic
Description : Which of the following is not a cause for loss of biodiversity? A. Destruction of habitat B. Invasion by alien species C. Keeping animals in zoological parks D. Over-exploitation of natural resources
Last Answer : C. Keeping animals in zoological parks
Description : Carroll's model of social responsibility includes the social responsibilities categories _____________, ____________, and _____________ plus those at the discretion of the firm. ... ; economic responsibilities D. occupational safety; legal responsibilities; economic responsibilities v
Last Answer : B
Description : With respect to a channel of distribution, the number of intermediary levels within the channel indicates the ____________ of a channel. A. width B. depth C. length D. similarity
Last Answer : C. length
Description : Cash Flow Statement is prepared from A. Profit and loss account B. Balance Sheet C. Additional Information D. All of the above
Last Answer : D. All of the above
Description : A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called? a. Phishing b. Carding c. Brand spoofing d. All of the above
Last Answer : d. All of the above
Description : The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? a. hacking b. cracking c. dumpster diving d. spoofing
Last Answer : d. spoofing
Description : Can a cyber attack program (like Stuxnet) be turned around, 'decoded' or something and used against other targets?
Last Answer : My understanding is that stuxnet contained code for a programmable logic controller (PLC) that's part of the target hardware that regulates the uranium centrifuges. This would be very device-specific & not ... purpose. Not that reverse-engineering the worm/virus didn't give them ideas of their own
Description : Role of security auditor is to ____________ a) secure the network b) probe for safety and security of organization’s security components and systems c) detects and prevents cyber attacks and threats to organization d) does penetration testing on different web applications
Last Answer : b) probe for safety and security of organization’s security components and systems
Description : Could my father get me for defamation if everything I say can be proven true?
Last Answer : answer:If you are going to write to him, use real, old-fashioned pen and paper and send the letters as registered mail. That way, you have old-fashioned records. Keep your language moderate. ... vitriol or personal attacks, no matter how justified. What's your older brother's opinion? Good luck.
Description : Would you like to join a mutual defamation support group?
Last Answer : Daloon, good to see you haven’t lost your sense of (dark) humor!
Last Answer : Defamation is a type of crime that can be both criminal and civil. If the accused is found guilty after a defamation suit is filed in a criminal court , he is liable to imprisonment or fine. ... convicted of this offense may be sentenced to two years' imprisonment without parole or a fine or both.
Description : SLANDER IS a) Written Defamation b) Verbal Defamation c) Both A and Bd) None of these
Last Answer : b) Verbal Defamation
Description : The ethical roots of the classical model of corporate social responsibility are found in which statement: A. The idea that the interests of stakeholders are as important as the interests of a corporation' ... C. The ethical imperative to cause no harm. D. The ethical imperative to prevent harm.
Last Answer : Answer: De Lorean
Description : The problems for criticism about large dams are that they A. Displace large number of peasants and trebles without proper rehabilitation B. Swallow up huge amounts of public money without the ... Contribute enormously to deforestation and the loss of biological diversity D. All of the above.
Last Answer : D. All of the above.
Description : Why should we conserve biodiversity? Because A. We should preserve the biodiversity we have inherited B. A loss of diversity may lead to a loss of ecological stability C. Both (a) and (b) D. None of the above.
Last Answer : C. Both (a) and (b)
Description : The problems for criticism about large dams are that they A. Displace large number of peasants and trebles without proper rehabilitation B. Swallow up huge amounts of public money without the ... . Contribute enormously to deforestation and the loss of biological diversity D. All of the above.
Last Answer : Both (a) and (b)
Description : To get the Net National Product, we deduct what from the Gross National Product: A. Direct Taxes B. Imports C. Interim payments D. Loss
Last Answer : D. Loss
Description : Which of the following are characteristics of B.E.P? A. There is no loss and no profit to the firm. B. Total revenue is equal to total cost. C. Contribution is equal to fixed cost. D. All of the above.
Description : When contribution is positive but equal to fixed cost, A. There is loss equal to fixed costs B. There is loss more than fixed costs C. There will be loss less than fixed costs D. There will be neither profit not loss
Last Answer : D. There will be neither profit not loss
Description : When contribution is negative but less than fixed cost, A. There is loss equal to fixed costs B. There is loss more than fixed costs C. There will be loss less than fixed costs D. All of above are false
Last Answer : C. There will be loss less than fixed costs
Description : Which of the following statements related to Contribution Analysis are ture? A. If contribution is zero, there is loss equal to fixed costs B. If contribution is negative, loss is less than fixed costs ... contribution is positive and more than fixed cost there will be profit. D. All of the above
Last Answer : A. If contribution is zero, there is loss equal to fixed costs
Description : Profit and Loss Account debit side includes A. Salary B. Discount allowed C. Postage & telegram D. All of the above
Description : The following are true about the effects of stress A. Hair loss and baldness B. Spasmodic pains in the neck and shoulders C. Hypertension D. All of the above
Description : Examples of social stressors are A. Financial problems B. Divorce C. Loss of a loved one D. Job interviews E. All of the above
Last Answer : E. All of the above
Description : Which one of the following has a right to claim compensation for any loss due to mis statement in prospectus A. Purchasing shares in Primary Market B. Secondary Market C. Subscribers to memo. D. All the above
Last Answer : A. Purchasing shares in Primary Market
Description : Which of the following is the leading cause of death and diseases worldwide? A. water pollution B. radioactive pollution C. air pollution D. soil pollution
Last Answer : A. water pollution
Description : Under a floating exchange rate system, an increase in U.S. imports of Japanese goods will cause the demand schedule for Japanese yen to: A. Increase, inducing a depreciation in the yen B. ... C. Increase, inducing an appreciation in the yen D. Decrease, inducing an appreciation in the yen
Last Answer : C. Increase, inducing an appreciation in the yen
Description : Management accounting is related with (i) The problem of choice making (ii) Recording of transactions (iii) Cause and effect relationships A. (i) and (ii) B. (ii) and (iii) C. (i) and (iii) D. All are false
Last Answer : C. (i) and (iii)
Last Answer : B. The free market theory which holds that managers are ethically obliged to ace as much money as possible for their stockholders because to do otherwise would undermine the very foundations of our free society.
Description : Anxiety can cause the following moods A. Irritable B. Nervous C. Panicky D. Anxious E. All of the above
Description : Which of the following statements is true A. Habitual behaviour patterns like over scheduling, procrastination, etc. Can cause negative stress B. Thoughts like fear, worrying about future etc. can cause negative stress C. Both ‘A’ & ‘B’ are true D. None of the above
Last Answer : C. Both ‘A’ & ‘B’ are true
Description : What is spoofing and sniffing ?
Last Answer : For hackers and criminals, these are two more ways in which they illegally infiltrate a computer system. 'Spoofing' has become increasingly popular as a common method of manipulating financial information ... almost impossible to detect. So data encryption is the only way to protect against it.
Description : What is used to see if a client is still connected to a NetWare server? A. Spoofing TCP/SAP B. Watchdog packet C. GNS Round Robin D. DNS Round Robin
Last Answer : Watchdog packet
Description : The common name for the crime of stealing - passwords is a. Hacking b. Spoofing c. Identity theft d. Cracking
Last Answer : b. Spoofing