Description : Which one is a communication channel threat? a. Sniffer programs b. Cyber vandalism c. Integrity threats d. All of the above
Last Answer : d. All of the above
Description : Laws relating to protecting the internet and other online communication technology isa. Cyber Law b. Computer Law c. IT Law d. None of these
Last Answer : b. Computer Law
Description : Copying or stealing someone else's works or ideas and passing them off as your own work is reffered as a. Computer vandalism b. Computer fraud c. Plagiarism d. All of the th
Last Answer : c. Plagiarism
Description : Role of security auditor is to ____________ a) secure the network b) probe for safety and security of organization’s security components and systems c) detects and prevents cyber attacks and threats to organization d) does penetration testing on different web applications
Last Answer : b) probe for safety and security of organization’s security components and systems
Description : THE PROCESS OF COMMUNICATION NEEDS A SENDER, A RECIPIENT AND A.... a) Caprice b) Medium c) Channel d) None of these
Last Answer : c) Channel
Description : The type of threats on the security of a computer system or network are …………………….. i) Interruption ii)Interception iii) Modification iv) Creation v)Fabrication a) i, ii, iii and iv only b) ii, iii, iv and v only c) i, ii, iii and v only d) All i, ii, iii, iv and v
Last Answer : c) i, ii, iii and v only
Description : Which of the following is/are threats for electronic payment systems? a) Computer worms b) Computer Virus c) Trojan horse d) All of the above
Last Answer : d) All of the above
Description : Poverty can be reduced by a combination of solar energy, ___________ andthe internet. a. Genetic engineering. b. Cyber café. c. Nanotechnology. d. All of the above.
Last Answer : a. Genetic engineering.
Description : The term used to describe a terrorist attack on a computer information system is- a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the these
Last Answer : b. Cyber Terrorism
Description : The term used to describe a terrorist attack on a computer information system is a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the these
Description : Intimidation threat a. Is not a threat to independence. b. Occurs when a member of the assurance team may be deterred from acting objectively and exercising professional skepticism by threats, actual or ... or opinion to the point that objectivity may, or may be perceived to be, compromised.
Last Answer : Occurs when a member of the assurance team may be deterred from acting objectively and exercising professional skepticism by threats, actual or perceived, from the directors, officers or employees of an assurance client.
Description : Which one is not a server level threat? a. Malicious code b. CGI threats c. Database threats d. Buffer overflows
Last Answer : a. Malicious code
Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens
Last Answer : d)It is used to ensure data corruption does not happens
Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity
Last Answer : a) Confidentiality
Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity
Last Answer : b) Integrity
Description : What are the smart security solutions given by Webroot against cyber threat?
Last Answer : Oh, I think that the best smart security solution was and remains use use of decentralised apps. For example Utopia p2p. These apps being a closed web system, do not requie the use of ... . In addition, they have their own separate browser, mail and even crypto, which further enhances security
Description : Who protects system from external threat? a) EDI b) ERP c) Firewall d) Script kiddies
Last Answer : c) Firewall
Description : If it is easy for competitions to enter the market, the threat of new entrants is considered: a) High b) Low c) More d) Less
Last Answer : a) High
Description : If the threat of substitute products or services in low it is a/an ; a) Disadvantages of the supplier b) Advantages of the buyer c) Advantages of the supplier d) None of the above
Last Answer : c) Advantages of the supplier
Description : Intruders is a most common security threat which referred as? a)Account Access b)Data Access c)Hacker or Cracker d)Computer Access
Last Answer : c)Hacker or Cracker
Description : Consider the following statements about Internet facility: 1) It serves as the largest one-line information system. 2) It provides the most dependable and latest mode for sending E-mail. 3) Recurring ... communication E-mail is very high. 4) It is often misused and has triggered cyber-crimes.
Last Answer : 1) It serves as the largest one-line information system
Description : What do people get out of commiting acts of vandalism?
Last Answer : Marking ones territory. A thrill to some. Breaking a taboo, to like vandalism, gets some people off. Like murdering a fry mascot in Nintendo MacDonald’s game.
Description : Is it vandalism if I paint rocks and trees around the city or in nature?
Last Answer : Yes, if you do it without permission.
Description : I'm looking for ideas/advice on how to help my son's school recover from a costly act of vandalism?
Last Answer : Track down the punk who did it and bring him a beatdown!
Description : Graffiti.. is it art? vandalism?
Last Answer : It depends on where it is done.
Description : Copying or stealing someone else's works or ideas and passing them off as your own work is reffered as a. Computer vandalism b. Computer fraud c. Plagiarism d. All of the these
Description : What is an arrangement made between marketing site that direct users from one site to the other? a) Spam b) Viral marketing c) Affiliate programs d) None of the above
Last Answer : c) Affiliate programs
Description : Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser? a) Affiliate programs b) Click-through c) Spam d) All of the above
Last Answer : b) Click-through
Description : Which term represents a count of the number of people who visit one site, click on are taken to the advertiser? a. Affiliate programs b. Click-through c. Spam d. Conversion rate
Last Answer : d. Conversion rate
Description : Spam B. Viral marketing C. Affiliate programs D. None of the above
Last Answer : B. Viral marketing
Description : …………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. a) Zombie b) Worm c) Trojan Horses d) Logic Bomb
Last Answer : c) Trojan Horses
Description : A ______________is a program that can infect other programs by modifying them,the modification includes a copy of the virus program which can go on to infect other programs a)Worm b)Virus c)Zombie d) Trpdoors
Last Answer : b)Virus
Description : The simultaneous processing of two or more programs by multiple processors is calleda. Multi-processing b.Multi-tasking c. Multi-sharing d. All of the these
Last Answer : a. Multi-processing
Description : ................... is an example of business to business services offered by Google which gains advertising revenue through hosted videos; a. Google AdWords pay per clickssponsored link ... c. You Tube brand Channel d. Google search application providing online website services for website owners.
Last Answer : c. You Tube brand Channel
Description : The way in which the message travels to the receiver is called: A. Encoding B. Decoding C. Channel D. Source
Last Answer : C. Channel
Description : Reuters is an international reputed media organisation, what is it? (a) News Agency (b) Media (c) News Channel (d) None of the above
Last Answer : (a) News Agency
Description : What is Frontline? (a) Name of a News Agency (b) Name of a Newspaper (c) Name of a News Channel (d) Name of a News magazine
Last Answer : (d) Name of a News magazine
Description : What is DNA? (a) Name of News Agency (b) Name of a Newspaper (c) Name of a News Channel (d) None of them
Last Answer : (b) Name of a Newspaper
Description : What's the best network traffic sniffer to extract SOAP envelope information?
Last Answer : All I can say is good luck. Everything I’ve ever heard about SOAP development is that it’s a nightmare. Thank God the industry has moved on…
Description : Is my sniffer broken from CS gas exposure?
Last Answer : It's more likely that you experience smellblindness to certain chemicals. For example, I'm smellblind to whatever it is that makes skunk, body odour, and CS gas smell unpleasant, since none of these are ... people, that there are many people like me, who don't find the smell of skunk overly awful.
Description : What's a good packet sniffer for OS X?
Last Answer : answer:Here are some that I really like: Eavesdrop: http://www.baurhome.net/software/eavesdrop/ Ettercap: http://ettercap.sourceforge.net/ KisMAC: http://kismac.macpirate.ch/about.php I still have yet to find a remarkably fast packet sniffer, but these are certainly satisfactory.
Description : Any way to discern whether an email has a sniffer embedded in it?
Last Answer : I have no idea, but in college my professors sent a lot of emails with receipts. It always popped up to let you know that it was sending a read receipt and you didn’t have to open any files for it to work. It just did.
Description : Junk e-mail is also called _____: a) Spam b) Spoof c) Cookie Crumbs d) Sniffer Script e) Spill
Last Answer : a) Spam
Description : Which of the following records logons and deletions? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen captures
Last Answer : c. Log analysis tools
Description : Which of the following examines information passing through switches, hubs, or routers? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen captures
Last Answer : b. Packet sniffer
Description : Which of the following captures screen images? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen capture software
Last Answer : d. Screen capture software
Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL
Last Answer : A) SSL