Letter bomb is also known as
a. Official bomb
b. Hacking bomb
c. Mail bomb
d. E-mail bomb

1 Answer

Answer :

d. E-mail bomb

Related questions

Description : Which of the following is an Email attack : a. Hacking b. Decrypting c. Bomb d. Banner

Last Answer : d. Banner

Description : An email bomb is also known as a ___ a) Letter bomb b) Internet c) Banner d) Attack

Last Answer : a) Letter bomb

Description : Which of the following is not a common approach to phishing? a. Send an official-looking e-mail asking for confidential information b. Ask people to fill out and return a fake letter using postal mail ... open a submission form on a web page d. All of the above are uncommon approaches to phishing

Last Answer : b. Ask people to fill out and return a fake letter using postal mail

Description : Ethical Hacking is also known as _____ A. Black Hat Hacking. B. White Hat Hacking. C. Encryption. D. None of these.

Last Answer : B. White Hat Hacking.

Description : The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? a. hacking b. cracking c. dumpster diving d. spoofing

Last Answer : d. spoofing

Description : Ethical hacking is also known as a) Black hat hacking b) White hat hacking c) Encrypting d) None of these

Last Answer : b) White hat hacking

Description : Ethical Hacking is known as ……….. a. White Hat hacking b. Black Hat hacking c. Encrypting d. None of these

Last Answer : a. White Hat hacking

Description : Exploration of a phone network without authorization is known as a. Scripting b. Phreaking c. Phone hacking d. Call tracing

Last Answer : b. Phreaking

Description : Identifying weakness in computer system or network to exploit its weaknesses to gain access is known as a. Cracking b. Cybersecurity c. Hacking d. Threatening

Last Answer : c. Hacking

Description : The facility which enables to print a large number of letter/documents with more or less similar text. Under it same invitation letter has to be sent to invitees, Only the name and address are to be changed. It is called: a) E - Mail b) Spam Mail c) Mail Merge d) None of These

Last Answer : c) Mail Merge

Description : Sending an E-mail is similar to: a) Drawing a Picture b) Talking On the Phone c) Writing a Letter d) None of These

Last Answer : c) Writing a Letter

Description : What is the first phase of hacking? A. Attack B. Maintaining access C. Gaining access D. Reconnaissance E. Scanning

Last Answer : D. Reconnaissance

Description : What is the first phase of hacking? A. Attack B. Maintaining access C. Gaining access D. Reconnaissance E. Scanning

Last Answer : D. Reconnaissance

Description : What is the first phase of hacking? a. Attack b. Maintaining access c. Gaining access d. Reconnaissance e. Scanning

Last Answer : e. Scanning

Description : What is the first phase of hacking? A. Attack B. Maintaining access C. Gaining access D. Reconnaissance E. Scanning

Last Answer : D. Reconnaissance

Description : When an official on duty in a mail van is attacked with any serious illness, the Mail Agent / Mail Guard should communicate the fact to a) The Guard of the train b) The Superintend c) The Record officer d) All the above

Last Answer : d) All the above

Description : Who has been delegated to power to grant rules 38 transfer of official belongings to Postmen/Mail guards? a) Senior Supdt. of Post office b) Super indent of Post office c) Postmaster General d) Head Post master of HO

Last Answer : c) Postmaster General

Description : Mark correct option related to official postal articles a) The rules relating to private correspondence apply equally to official postal article b) Service stamps can be used for prepayin outward official foreign ... means of service stamps c) All of above are correct d) None of these are correct

Last Answer : c) All of above are correct

Description : Mark incorrect option a) Complaint and enquiries relating to foreign mail the postage stamp equivalent to the fee prescribed is charged b) The sender of foreign article should be written RENVOI PAR AVION'( ... but this rule shall not apply to an official parcel. d) All the above are correct

Last Answer : d) All the above are correct

Description : Punishment for Hacking in Inida is: a) Imprisonment up to 3 years only b) Fine (Depend on case to case) only c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : An error in computer program is called: a) Hacking b) Virus c) Bug d) None of These

Last Answer : c) Bug

Description : Punishment for Hacking in Inida is: a) Imprisonment up to 3 years only b) Fine (Depend on case to case) only c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : Which is/are the main provisions of Information Technology (IT) Act, 2000? 1) Finalisation of contracts through electronic media. 2) Legal recognition to digital signatures and documents. 3) Making hacking with computer system an office. 4) All of the above

Last Answer : 4) All of the above

Description : The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________ a) Sponsored Hackers b) Hactivists c) Script Kiddies d) Whistle Blowers

Last Answer : d) Whistle Blowers

Description : Which is the legal form of hacking based on which jobs are provided in IT industries and firms? a) Cracking b) Non ethical Hacking c) Ethical hacking d) Hactivism

Last Answer : c) Ethical hacking

Description : 5. Hacking for a cause is called __________________ A. Active hacking B. Hacktivism C. Activism D. Black-hat hacking

Last Answer : B. Hacktivism

Description : Which term refers for modifying a computer in a way which was not originally intended to view Information? A. Metadata B. Live analysis C. Hacking D. Bit Copy

Last Answer : C. Hacking

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : . After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : The legal risks of ethical hacking include lawsuits due to __________ of personal data. a) stealing b) disclosure c) deleting d) hacking

Last Answer : b) disclosure

Description : ____________ is the technique used in business organizations and firms to protect IT assets. a) Ethical hacking b) Unethical hacking c) Fixing bugs d) Internal data-breach

Last Answer : a) Ethical hacking

Description : ___________ has now evolved to be one of the most popular automated tools for unethical hacking. a) Automated apps b) Database software c) Malware d) Worms

Last Answer : c) Malware

Description : 4. Hacking for a cause is called __________________. A. Active hacking B. Hacktivism C. Activism D. Black-hat hacking

Last Answer : B. Hacktivism

Description : Which is not an Ethical Hacking related career a. Back-End Developer b. Software Tester c. Software Developer d. Computer Networking Specialist

Last Answer : b. Software Tester

Description : How many steps are there the legality of ethical hacking ? a. 5 b. 2 c. 7 d. 6

Last Answer : a. 5

Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data

Last Answer : a. Identifying weakness in computer system or networks

Description : Investigation means : a. Collection of information b. A procedure to find the Digital Evidence c. Searching over internet d. Hacking computer systems

Last Answer : b. A procedure to find the Digital Evidence

Description : Ethical Issues in Digital Forensic means : a. Set of moral principals that regulate the use of computers b. Related to ethical hacking c. Honesty towards investigation d. Compliance with law

Last Answer : a. Set of moral principals that regulate the use of computers

Description : Banner grabbing is often used for……. a. White hat hacking b. Black hat hacking c. Gray hat hacking d. Script kiddies

Last Answer : a. White hat hacking

Description : Vulnerability scanning in Ethical hacking finds………. a. Strengths b. Weakness c. A&B d. None of these

Last Answer : b. Weakness

Description : How many steps are there the legality of ethical hacking ? a. 5 b. 2 c. 7 d. 6

Last Answer : a. 5

Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data

Last Answer : d. Protocols of corrupting data

Description : Investigation means : a. Collection of information b. A procedure to find the Digital Evidence c. Searching over internet d. Hacking computer systems

Last Answer : b. A procedure to find the Digital Evidence

Description : Hacking for a cause is called __________________. A. Active hacking B. Hacktivism C. Activism D. Black-hat hacking

Last Answer : B. Hacktivism

Description : . What is the first phase of hacking? A. Attack B. Maintaining access C. Gaining access D. Reconnaissance

Last Answer : D. Reconnaissance