Description : Which of the following examines information passing through switches, hubs, or routers? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen captures
Last Answer : b. Packet sniffer
Description : Which of the following captures screen images? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen capture software
Last Answer : d. Screen capture software
Description : What is a program, when installed on a computer, records every keystroke and mouse click? a. Key logger software b. Hardware key logger c. Cookie d. Adware
Last Answer : a. Key logger software
Description : Cookies are used to do which of the following? a. Store your ID and password for subsequent logons to the site b. Store contents of electronic shopping carts c. To track web activity d. All of the above and more
Last Answer : d. All of the above and more
Description : Which one is a communication channel threat? a. Sniffer programs b. Cyber vandalism c. Integrity threats d. All of the above
Last Answer : d. All of the above
Description : What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know ... about? a. Web log b. Clickstream c. Anonymous Web browsing service d. None of the above
Last Answer : d. None of the above
Description : What's a good packet sniffer for OS X?
Last Answer : answer:Here are some that I really like: Eavesdrop: http://www.baurhome.net/software/eavesdrop/ Ettercap: http://ettercap.sourceforge.net/ KisMAC: http://kismac.macpirate.ch/about.php I still have yet to find a remarkably fast packet sniffer, but these are certainly satisfactory.
Description : Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Private key b. Symmetric c. Asymmetric d. None
Last Answer : c. Asymmetric
Description : Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Public key b. Symmetric c. Asymmetric d. None
Last Answer : b. Symmetric
Description : Secret key is used for a. Public key cryptography b. Private key cryptography c. Asymmetric key cryptography d. None of these
Last Answer : b. Private key cryptography
Description : What checks out your computer or network for potential weaknesses? a. Encryption b. Public key encryption c. Security‐auditing software d. None of the above
Last Answer : c. Security‐auditing software
Description : What looks for people on the network who shouldn't be there or who are acting suspiciously? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software
Last Answer : c. Intrusion‐detection software
Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software
Last Answer : b. Public key encryption
Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above
Last Answer : a. Encryption
Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private
Last Answer : d. public, private
Description : Is it possible to put a key logger,or in any other way, spy on an iPad that uses a data plan?
Last Answer : It is not hard at all. There are plenty of legitimate tools out there that do this very thing. We utilize one tool called spector soft360 to monitor suspect employee activity.
Description : Do you know where I can buy a free remote key logger?
Last Answer : There are many key loggers available on the internet today due to all of the security issues on the internet. Webwatchers is one of these sites that you can access. I think that you would be very satisfied using this site.
Description : Key logger is a a) Firmware b) Antivirus c) Spyware d) All of the above
Last Answer : c) Spyware
Description : Which one of the following statements is true? a. Plasmids are circular molecules of RNA. b. RNA replicates by a conservative method of replication. c. Deletions or insertions of a ... reading frameshift during translation. d. Okazaki fragments are removed from a RNA before translation occurs.
Last Answer : c. Deletions or insertions of a nucleotide in a gene will cause a reading frameshift during translation.
Description : Which of the statements give below is correct with respect to frameshift mutation a) a single nucleotide base change, insertion, or deletion of the genetic material b) Glutamine is replaced by valine c) ... or deletions of a number of nucleotides in a DNA sequence that is not divisible by three.
Last Answer : d) insertions or deletions of a number of nucleotides in a DNA sequence that is not divisible by three.
Description : What price should I charge someone to design an e-commerce website?
Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.
Description : The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Mails b. Pen drives and cds c. Websites d. All the above
Last Answer : d. All the above
Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : c. Script virus
Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : a. Macro
Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above
Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above
Last Answer : b. Cryptography
Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above
Description : Which one is not a layer of E‐commerce infrastructure a. Physical layer b. Product layer c. Service layer d. None
Last Answer : d. None
Description : Which type deals with auction? a. B2B b. B2C c. C2B d. C2C
Last Answer : d. C2C
Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above
Last Answer : c. Affiliate programs
Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above
Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine
Last Answer : c. Copyright
Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None
Description : OTP stands for a. On Time Password b. On Time processing c. One time processor d. None
Last Answer : a. On Time Password
Description : which one is not an E‐payment method used in India a. Debit card b. Credit card c. e‐cheque d. none
Last Answer : d. none
Description : Which one is an online payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque
Last Answer : d. e‐cheque
Description : Which one is not an online payment mode? a. Cash on delivery b. Debit card c. Credit card d. e‐cheque
Last Answer : a. Cash on delivery
Description : Which one is an offline payment mode? a. Cash on delivery b. Cash before delivery c. Credit card d. Both a and b
Last Answer : d. Both a and b
Description : Which one is not an offline payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque
Description : Secure communication means a. Protect transmission of credit card number b. Guarantee privacy of customer c. Unauthorized access of payment details d. All the above
Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None
Last Answer : a. Trojan horse
Description : The basic elements of website is a. Home page b. Web pages c. Links and banners d. All the above
Description : Which one is a logical threat? a. Hacking b. Storm c. Phishing d. None of the above
Last Answer : a. Hacking
Description : Which one is a physical threat? a. Phishing b. Storm c. Earthquake d. All the above
Description : Which one is not a physical threat? a. Hacking b. Storm c. Phishing d. None of the above
Description : Which one is not a server level threat? a. Malicious code b. CGI threats c. Database threats d. Buffer overflows
Last Answer : a. Malicious code
Description : Which one is an encryption technique? a. RSA b. DES c. AES d. All of the above
Description : Which one is not an encryption technique? a. RSA b. DES c. AES d. FTP
Last Answer : d. FTP
Description : Which one is a client level threat? a. Malicious code b. Viruses c. Active contents d. All the above
Description : ‐‐‐‐‐‐‐‐‐‐‐‐‐‐ is backbone of all E‐payments in E‐commerce a. EFT b. EPS c. PayPal d. None of these
Last Answer : b. EPS