Which one is a communication channel threat?
a) Sniffer programs
b) Cyber vandalism
c) Integrity threats
d) All of the above

1 Answer

Answer :

d) All of the above

Related questions

Description : Which one is a communication channel threat? a. Sniffer programs b. Cyber vandalism c. Integrity threats d. All of the above

Last Answer : d. All of the above

Description : Laws relating to protecting the internet and other online communication technology isa. Cyber Law b. Computer Law c. IT Law d. None of these

Last Answer : b. Computer Law

Description : Copying or stealing someone else's works or ideas and passing them off as your own work is reffered as a. Computer vandalism b. Computer fraud c. Plagiarism d. All of the th

Last Answer : c. Plagiarism

Description : Role of security auditor is to ____________ a) secure the network b) probe for safety and security of organization’s security components and systems c) detects and prevents cyber attacks and threats to organization d) does penetration testing on different web applications

Last Answer : b) probe for safety and security of organization’s security components and systems

Description : THE PROCESS OF COMMUNICATION NEEDS A SENDER, A RECIPIENT AND A.... a) Caprice b) Medium c) Channel d) None of these

Last Answer : c) Channel

Description : The type of threats on the security of a computer system or network are …………………….. i) Interruption ii)Interception iii) Modification iv) Creation v)Fabrication a) i, ii, iii and iv only b) ii, iii, iv and v only c) i, ii, iii and v only d) All i, ii, iii, iv and v

Last Answer : c) i, ii, iii and v only

Description : Which of the following is/are threats for electronic payment systems? a) Computer worms b) Computer Virus c) Trojan horse d) All of the above

Last Answer : d) All of the above

Description : Poverty can be reduced by a combination of solar energy, ___________ andthe internet. a. Genetic engineering. b. Cyber café. c. Nanotechnology. d. All of the above.

Last Answer : a. Genetic engineering.

Description : Poverty can be reduced by a combination of solar energy, ___________ andthe internet. a. Genetic engineering. b. Cyber café. c. Nanotechnology. d. All of the above.

Last Answer : a. Genetic engineering.

Description : The term used to describe a terrorist attack on a computer information system is- a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the these

Last Answer : b. Cyber Terrorism

Description : The term used to describe a terrorist attack on a computer information system is a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the these

Last Answer : b. Cyber Terrorism

Description : Intimidation threat a. Is not a threat to independence. b. Occurs when a member of the assurance team may be deterred from acting objectively and exercising professional skepticism by threats, actual or ... or opinion to the point that objectivity may, or may be perceived to be, compromised.

Last Answer : Occurs when a member of the assurance team may be deterred from acting objectively and exercising professional skepticism by threats, actual or perceived, from the directors, officers or employees of an assurance client.

Description : Which one is not a server level threat? a. Malicious code b. CGI threats c. Database threats d. Buffer overflows

Last Answer : a. Malicious code

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : a) Confidentiality

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : b) Integrity

Description : What are the smart security solutions given by Webroot against cyber threat?

Last Answer : Oh, I think that the best smart security solution was and remains use use of decentralised apps. For example Utopia p2p. These apps being a closed web system, do not requie the use of ... . In addition, they have their own separate browser, mail and even crypto, which further enhances security

Description : Who protects system from external threat? a) EDI b) ERP c) Firewall d) Script kiddies

Last Answer : c) Firewall

Description : If it is easy for competitions to enter the market, the threat of new entrants is considered: a) High b) Low c) More d) Less

Last Answer : a) High

Description : If the threat of substitute products or services in low it is a/an ; a) Disadvantages of the supplier b) Advantages of the buyer c) Advantages of the supplier d) None of the above

Last Answer : c) Advantages of the supplier

Description : Intruders is a most common security threat which referred as? a)Account Access b)Data Access c)Hacker or Cracker d)Computer Access

Last Answer : c)Hacker or Cracker

Description : Consider the following statements about Internet facility: 1) It serves as the largest one-line information system. 2) It provides the most dependable and latest mode for sending E-mail. 3) Recurring ... communication E-mail is very high. 4) It is often misused and has triggered cyber-crimes.

Last Answer : 1) It serves as the largest one-line information system

Description : What do people get out of commiting acts of vandalism?

Last Answer : Marking ones territory. A thrill to some. Breaking a taboo, to like vandalism, gets some people off. Like murdering a fry mascot in Nintendo MacDonald’s game.

Description : Is it vandalism if I paint rocks and trees around the city or in nature?

Last Answer : Yes, if you do it without permission.

Description : I'm looking for ideas/advice on how to help my son's school recover from a costly act of vandalism?

Last Answer : Track down the punk who did it and bring him a beatdown!

Description : Graffiti.. is it art? vandalism?

Last Answer : It depends on where it is done.

Description : Copying or stealing someone else's works or ideas and passing them off as your own work is reffered as a. Computer vandalism b. Computer fraud c. Plagiarism d. All of the these

Last Answer : c. Plagiarism

Description : What is an arrangement made between marketing site that direct users from one site to the other? a) Spam b) Viral marketing c) Affiliate programs d) None of the above

Last Answer : c) Affiliate programs

Description : Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser? a) Affiliate programs b) Click-through c) Spam d) All of the above

Last Answer : b) Click-through

Description : Which term represents a count of the number of people who visit one site, click on are taken to the advertiser? a. Affiliate programs b. Click-through c. Spam d. Conversion rate

Last Answer : d. Conversion rate

Description : Which term represents a count of the number of people who visit one site, click on are taken to the advertiser? a. Affiliate programs b. Click-through c. Spam d. Conversion rate

Last Answer : d. Conversion rate

Description : Spam B. Viral marketing C. Affiliate programs D. None of the above

Last Answer : B. Viral marketing

Description : …………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. a) Zombie b) Worm c) Trojan Horses d) Logic Bomb

Last Answer : c) Trojan Horses

Description : A ______________is a program that can infect other programs by modifying them,the modification includes a copy of the virus program which can go on to infect other programs a)Worm b)Virus c)Zombie d) Trpdoors

Last Answer : b)Virus

Description : The simultaneous processing of two or more programs by multiple processors is calleda. Multi-processing b.Multi-tasking c. Multi-sharing d. All of the these

Last Answer : a. Multi-processing

Description : The simultaneous processing of two or more programs by multiple processors is calleda. Multi-processing b.Multi-tasking c. Multi-sharing d. All of the these

Last Answer : a. Multi-processing

Description : ................... is an example of business to business services offered by Google which gains advertising revenue through hosted videos; a. Google AdWords pay per clickssponsored link ... c. You Tube brand Channel d. Google search application providing online website services for website owners.

Last Answer : c. You Tube brand Channel

Description : The way in which the message travels to the receiver is called: A. Encoding B. Decoding C. Channel D. Source

Last Answer : C. Channel

Description : Reuters is an international reputed media organisation, what is it? (a) News Agency (b) Media (c) News Channel (d) None of the above

Last Answer : (a) News Agency

Description : What is Frontline? (a) Name of a News Agency (b) Name of a Newspaper (c) Name of a News Channel (d) Name of a News magazine

Last Answer : (d) Name of a News magazine

Description : What is DNA? (a) Name of News Agency (b) Name of a Newspaper (c) Name of a News Channel (d) None of them

Last Answer : (b) Name of a Newspaper

Description : What's the best network traffic sniffer to extract SOAP envelope information?

Last Answer : All I can say is good luck. Everything I’ve ever heard about SOAP development is that it’s a nightmare. Thank God the industry has moved on…

Description : Is my sniffer broken from CS gas exposure?

Last Answer : It's more likely that you experience smellblindness to certain chemicals. For example, I'm smellblind to whatever it is that makes skunk, body odour, and CS gas smell unpleasant, since none of these are ... people, that there are many people like me, who don't find the smell of skunk overly awful.

Description : What's a good packet sniffer for OS X?

Last Answer : answer:Here are some that I really like: Eavesdrop: http://www.baurhome.net/software/eavesdrop/ Ettercap: http://ettercap.sourceforge.net/ KisMAC: http://kismac.macpirate.ch/about.php I still have yet to find a remarkably fast packet sniffer, but these are certainly satisfactory.

Description : Any way to discern whether an email has a sniffer embedded in it?

Last Answer : I have no idea, but in college my professors sent a lot of emails with receipts. It always popped up to let you know that it was sending a read receipt and you didn’t have to open any files for it to work. It just did.

Description : Junk e-mail is also called _____: a) Spam b) Spoof c) Cookie Crumbs d) Sniffer Script e) Spill

Last Answer : a) Spam

Description : Which of the following records logons and deletions? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen captures

Last Answer : c. Log analysis tools

Description : Which of the following examines information passing through switches, hubs, or routers? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen captures

Last Answer : b. Packet sniffer

Description : Which of the following captures screen images? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen capture software

Last Answer : d. Screen capture software

Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL