____________ is when the criminal disseminates the information to defame you and take  revenge on you, or cause loss.
A. Cyber attack
B. Cyber defamation
C. Spoofing’
D. Phisking

1 Answer

Answer :

B. Cyber defamation

Related questions

Description : A kind of impersonation in order to get access to other computers is__________ A. Hacking B. Spam C. Phishing D. Spoofing

Last Answer : D. Spoofing

Description : Illegal intrusion of a computer system without authorization of the owner or user is__________ A. Hacking B. Spam C. Phishing D. Spoofing

Last Answer : A. Hacking

Description : _________- is a prefix to everything that transports us instantly into the virtual world. A. Cyber B. Internet C. Tech D. None of the above

Last Answer : A. Cyber

Description : Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________ a) State sponsored hackers b) Blue Hat Hackers c) Cyber Terrorists d) Red Hat Hackers

Last Answer : c) Cyber Terrorists

Description : Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________ a) State sponsored hackers b) Blue Hat Hackers c) Cyber Terrorists d) Red Hat Hackers

Last Answer : c) Cyber Terrorists

Description : What is the attack called “evil twin” a) Rogue access point b) ARP poisoning c) Session hijacking d) MAC spoofing

Last Answer : a) Rogue access point

Description : What is the attack called “evil twin”?  Rogue access point  ARP poisoning  Session hijacking  MAC spoofing

Last Answer :  MAC spoofing

Description : The term used to describe a terrorist attack on a computer information system is- a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the these

Last Answer : b. Cyber Terrorism

Description : The term used to describe a terrorist attack on a computer information system is a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the these

Last Answer : b. Cyber Terrorism

Description : A minor was facing a criminal prosecution for smuggling drugs. He borrowed Rs. 5000 to hire an advocate to defend him in the court of law. What is the remedy available to the creditor if the ... the age of majority D. The creditor can recover his amount from the parent or guardian of the minor

Last Answer : A. The creditor cannot recover the amount from the minor since a contract with a minor is void ab initio

Description : An acute disease becomes _____ when the body is incapable of ridding itself of the pathogen, while a local disease becomes ______ when it disseminates to deeper organs and tissues. a. Contagious; Systemic b. Contagious; Secondary c. Chronic; Systemic d. Chronic; Secondary

Last Answer : c. Chronic; Systemic

Description : Which of the following is not a cause for loss of biodiversity? A. Destruction of habitat B. Invasion by alien species C. Keeping animals in zoological parks D. Over-exploitation of natural resources

Last Answer : C. Keeping animals in zoological parks

Description : Which of the following is not a cause for loss of biodiversity? A. Destruction of habitat B. Invasion by alien species C. Keeping animals in zoological parks D. Over-exploitation of natural resources

Last Answer : C. Keeping animals in zoological parks

Description : Carroll's model of social responsibility includes the social responsibilities categories _____________, ____________, and _____________ plus those at the discretion of the firm. ... ; economic responsibilities D. occupational safety; legal responsibilities; economic responsibilities v

Last Answer : B

Description : With respect to a channel of distribution, the number of intermediary levels within the channel indicates the ____________ of a channel. A. width B. depth C. length D. similarity

Last Answer : C. length

Description : Cash Flow Statement is prepared from A. Profit and loss account B. Balance Sheet C. Additional Information D. All of the above

Last Answer : D. All of the above

Description : A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called? a. Phishing b. Carding c. Brand spoofing d. All of the above

Last Answer : d. All of the above

Description : The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? a. hacking b. cracking c. dumpster diving d. spoofing

Last Answer : d. spoofing

Description : Can a cyber attack program (like Stuxnet) be turned around, 'decoded' or something and used against other targets?

Last Answer : My understanding is that stuxnet contained code for a programmable logic controller (PLC) that's part of the target hardware that regulates the uranium centrifuges. This would be very device-specific & not ... purpose. Not that reverse-engineering the worm/virus didn't give them ideas of their own

Description : Role of security auditor is to ____________ a) secure the network b) probe for safety and security of organization’s security components and systems c) detects and prevents cyber attacks and threats to organization d) does penetration testing on different web applications

Last Answer : b) probe for safety and security of organization’s security components and systems

Description : Could my father get me for defamation if everything I say can be proven true?

Last Answer : answer:If you are going to write to him, use real, old-fashioned pen and paper and send the letters as registered mail. That way, you have old-fashioned records. Keep your language moderate. ... vitriol or personal attacks, no matter how justified. What's your older brother's opinion? Good luck.

Description : Would you like to join a mutual defamation support group?

Last Answer : Daloon, good to see you haven’t lost your sense of (dark) humor!

Last Answer : Defamation is a type of crime that can be both criminal and civil. If the accused is found guilty after a defamation suit is filed in a criminal court , he is liable to imprisonment or fine. ... convicted of this offense may be sentenced to two years' imprisonment without parole or a fine or both.

Description : SLANDER IS a) Written Defamation b) Verbal Defamation c) Both A and Bd) None of these

Last Answer : b) Verbal Defamation

Description : The problems for criticism about large dams are that they A. Displace large number of peasants and trebles without proper rehabilitation B. Swallow up huge amounts of public money without the ... Contribute enormously to deforestation and the loss of biological diversity D. All of the above.

Last Answer : D. All of the above.

Description : Why should we conserve biodiversity? Because A. We should preserve the biodiversity we have inherited B. A loss of diversity may lead to a loss of ecological stability C. Both (a) and (b) D. None of the above.

Last Answer : C. Both (a) and (b)

Description : The problems for criticism about large dams are that they A. Displace large number of peasants and trebles without proper rehabilitation B. Swallow up huge amounts of public money without the ... . Contribute enormously to deforestation and the loss of biological diversity D. All of the above.

Last Answer : D. All of the above.

Description : Why should we conserve biodiversity? Because A. We should preserve the biodiversity we have inherited B. A loss of diversity may lead to a loss of ecological stability C. Both (a) and (b) D. None of the above.

Last Answer : Both (a) and (b)

Description : The problems for criticism about large dams are that they A. Displace large number of peasants and trebles without proper rehabilitation B. Swallow up huge amounts of public money without the ... . Contribute enormously to deforestation and the loss of biological diversity D. All of the above.

Last Answer : D. All of the above.

Description : Why should we conserve biodiversity? Because A. We should preserve the biodiversity we have inherited B. A loss of diversity may lead to a loss of ecological stability C. Both (a) and (b) D. None of the above.

Last Answer : C. Both (a) and (b)

Description : To get the Net National Product, we deduct what from the Gross National Product: A. Direct Taxes B. Imports C. Interim payments D. Loss

Last Answer : D. Loss

Description : Which of the following are characteristics of B.E.P? A. There is no loss and no profit to the firm. B. Total revenue is equal to total cost. C. Contribution is equal to fixed cost. D. All of the above.

Last Answer : D. All of the above.

Description : When contribution is positive but equal to fixed cost, A. There is loss equal to fixed costs B. There is loss more than fixed costs C. There will be loss less than fixed costs D. There will be neither profit not loss

Last Answer : D. There will be neither profit not loss

Description : When contribution is negative but less than fixed cost, A. There is loss equal to fixed costs B. There is loss more than fixed costs C. There will be loss less than fixed costs D. All of above are false

Last Answer : C. There will be loss less than fixed costs

Description : Which of the following statements related to Contribution Analysis are ture? A. If contribution is zero, there is loss equal to fixed costs B. If contribution is negative, loss is less than fixed costs ... contribution is positive and more than fixed cost there will be profit. D. All of the above

Last Answer : A. If contribution is zero, there is loss equal to fixed costs

Description : Profit and Loss Account debit side includes A. Salary B. Discount allowed C. Postage & telegram D. All of the above

Last Answer : D. All of the above

Description : The following are true about the effects of stress A. Hair loss and baldness B. Spasmodic pains in the neck and shoulders C. Hypertension D. All of the above

Last Answer : D. All of the above

Description : Examples of social stressors are A. Financial problems B. Divorce C. Loss of a loved one D. Job interviews E. All of the above

Last Answer : E. All of the above

Description : Which one of the following has a right to claim compensation for any loss due to mis statement in prospectus A. Purchasing shares in Primary Market B. Secondary Market C. Subscribers to memo. D. All the above

Last Answer : A. Purchasing shares in Primary Market

Description : Which of the following is the leading cause of death and diseases worldwide? A. water pollution B. radioactive pollution C. air pollution D. soil pollution

Last Answer : A. water pollution

Description : Which of the following is the leading cause of death and diseases worldwide? A. water pollution B. radioactive pollution C. air pollution D. soil pollution

Last Answer : A. water pollution

Description : Under a floating exchange rate system, an increase in U.S. imports of Japanese goods will cause the demand schedule for Japanese yen to: A. Increase, inducing a depreciation in the yen B. ... C. Increase, inducing an appreciation in the yen D. Decrease, inducing an appreciation in the yen

Last Answer : C. Increase, inducing an appreciation in the yen

Description : Management accounting is related with (i) The problem of choice making (ii) Recording of transactions (iii) Cause and effect relationships A. (i) and (ii) B. (ii) and (iii) C. (i) and (iii) D. All are false

Last Answer : C. (i) and (iii)

Description : The ethical roots of the classical model of corporate social responsibility are found in which statement: A. The idea that the interests of stakeholders are as important as the interests of a corporation' ... C. The ethical imperative to cause no harm. D. The ethical imperative to prevent harm.

Last Answer : B. The free market theory which holds that managers are ethically obliged to ace as much money as possible for their stockholders because to do otherwise would undermine the very foundations of our free society.

Description : Anxiety can cause the following moods A. Irritable B. Nervous C. Panicky D. Anxious E. All of the above

Last Answer : E. All of the above

Description : Which of the following statements is true A. Habitual behaviour patterns like over scheduling, procrastination, etc. Can cause negative stress B. Thoughts like fear, worrying about future etc. can cause negative stress C. Both ‘A’ & ‘B’ are true D. None of the above

Last Answer : C. Both ‘A’ & ‘B’ are true

Description : What is spoofing and sniffing ?

Last Answer : For hackers and criminals, these are two more ways in which they illegally infiltrate a computer system. 'Spoofing' has become increasingly popular as a common method of manipulating financial information ... almost impossible to detect. So data encryption is the only way to protect against it.

Description : What is used to see if a client is still connected to a NetWare server? A. Spoofing TCP/SAP B. Watchdog packet C. GNS Round Robin D. DNS Round Robin

Last Answer : Watchdog packet

Description : The common name for the crime of stealing - passwords is a. Hacking b. Spoofing c. Identity theft d. Cracking

Last Answer : b. Spoofing