Description : The IP address was traced to a cable Internet services provider in city are of a) Hyderabad b) Nagpur c) Aurangabad d) Ahmednagar
Last Answer : a) Hyderabad
Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these
Last Answer : a) Cybergaming crime
Description : Can e-mail addresses & other personal informations be traced through your IP address?
Last Answer : In most cases, no. You are likely to be using a dynamic IP address that is changing. You could be traced to the owner of the IP block from which it was allocated (almost certainly your ISP ... d have to be doing something seriously bad before anyone would allocate the time and resources to find you.
Description : Cyber trails are advantageous because: A. They are not connected to the physical world. B. Nobody can be harmed by crime on the Internet. C. They are easy to follow. D. Offenders who are unaware of them leave behind more clues than they otherwise would have.
Last Answer : D. Offenders who are unaware of them leave behind more clues than they otherwise would have.
Description : Can my internet posts be traced to my IP address?
Last Answer : It’s certainly possible, but not terribly likely.
Description : Due to the growth of the internet and the predicted depletion of available addresses, a new version of IP version 6 using _____for the address was developed in 1995: a) 128 Bits b) 129 Bits c) 130 Bits d) None of These
Last Answer : a) 128 Bits
Description : Which among the following is correct: a) An IP address can be private - for use on Local Area Network (LAN). b) It can be use on the internet or other wide area network (WAN). c) IP addresses ... dynamically (assigned by another device on the network on demand). d) All of the Above e) None of These
Last Answer : d) All of the Above
Description : Computer crime or Cyber crime is crime that involves: a) Computer b) Network c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : Computer crime or Cyber crime is crime that involves: a) Computer b) Network c) Both of Above d) None of These ✐ 386. Net crim
Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way
Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way
Description : Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii)monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv
Last Answer : b. i, ii, iii
Description : If, while searching a computer for evidence of a specific crime, evidence of a new, Unrelated crime is discovered, the best course of action is: a. Abandon the original search, and ... a warrant that addresses the new inquiry d. Continue with the original search, ignoring the new information
Last Answer : c. Stop the search and obtain a warrant that addresses the new inquiry
Description : What happens to ip addresses if there are over 4,23 billion internet users.
Last Answer : answer:IPv6 This is planned for. I wouldn’t worry about it.
Description : Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? a. ARQ (Automatic Repeat Request) b. ARP (Address Resolution Protocol) c. SLIP (Serial Line Internet Protocol) d. PLIP (Parallel Line Internet Protocol)
Last Answer : b. ARP (Address Resolution Protocol)
Description : Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? A. ARQ Automatic Repeat Request B. ARP Address Resolution Protocol C. SLIP Serial Line Internet Protocol D. PLIP Parallel Line Internet Protocol
Last Answer : B. ARP Address Resolution Protocol
Description : ………………….. is responsible for converting the higher level protocol addresses (IP addresses) to physical network addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)
Last Answer : A) Address Resolution Protocol (ARP)
Description : A hardened firewall host on an intranet (i) has a proxy application gateway program running on it (ii)Allows specified internet users to access specified services in the intranet (iii) Initiates all internet activities requested by clients ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv
Last Answer : c. i, ii, iii, iv
Description : 8. Nslookup can be used to gather information regarding which of the following? A. Host names and IP addresses B. Whois information C. DNS server locations D. Name server types and operating systems
Last Answer : A. Host names and IP addresses
Description : IP is the full form of a) Internet Provider b) Internet Protocol c) Internet Password d) Do Not Know
Last Answer : b) Internet Protocol
Description : Name the primary law in India dealing with cyber crime and electronic commerce. -Technology
Last Answer : The primary law is Information Technology Act 2000.
Description : What is a computer cyber crime?
Last Answer : Cyber crimes are crimes that are perpetrated with the use of a computer. An example might be where someone uses a pc to illegally obtain someone else's personal information and then the "bad ... information to steal money from the victim. Simply, cyber crime is crime committed using a computer.
Description : What is Cyber Crime ?
Last Answer : According to the encyclopedia, "cyber crime" refers to the crime that is committed using the Internet . It is related to computers and computer networks.
Last Answer : Cyber crime is a computer related crime.
Description : What are two examples of cyber crime stories?
Last Answer : Need answer
Description : ______________is a branch of forensic science encompassing the recovery and investigation of material found in digital devices often in relation to computer crime. a. Analog forensic b. Digital forensic c. Cyber forensic
Last Answer : b. Digital forensic
Description : ___________is well established science where various contribution have been made A. Forensic B. Crime C. Cyber Crime D. Evidence
Last Answer : A. Forensic
Description : High levels of demand have decreased the supply of un-allocated internet protocol version 4 addresses available for assignment to internet service providers and end user organization since the _____: a) 1980s b) 1990s c) 2000s d) None of These
Last Answer : a) 1980s
Description : Which of the following statement is incorrect? A. The Addresses Resolution Protocol, ARP, allows a host to find the physicaladdress ofa target host on the samephysical network, given only the target IP address. ... -addresses of our choice to every machine. D. All of theabove E. None of the above
Last Answer : All of theabove
Description : ISP stands for: a) International Service Provider b) Internet Service Provider c) Input Software Protocol d) None of These
Last Answer : b) Internet Service Provider
Description : ISP stands for: a) Internet Speed Provider b) Internet Service Provider c) Internet Security Protocol d) None of These
Description : The software that allows users to surf the Internet is called a/an _____: a) Search Engine b) Internet Service Provider c) Multimedia Application d) Browser e) Internet Surfing Provider
Last Answer : d) Browser
Description : Your business has contracted with another company to have them host and run an application for your company over the Internet. The company providing this service to your business is called an a) ... b) Internet access provider c) Application service provider d) Outsource agency e) None of these
Last Answer : d) Outsource agency
Description : Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _____security is concerned with protecting software from unauthorized tampering or damage: a) Data b) Cyber c) Internet d) Meta Physical e) Publicity
Last Answer : b) Cyber
Description : Consider the following statements about Internet facility: 1) It serves as the largest one-line information system. 2) It provides the most dependable and latest mode for sending E-mail. 3) Recurring ... communication E-mail is very high. 4) It is often misused and has triggered cyber-crimes.
Last Answer : 1) It serves as the largest one-line information system
Description : is a branch of Science which deals with the helping machine find solutions to complex problems in a more human like fashion a. Artificial Intelligence b. Internet Od Things c. Embedded system d. cyber Security
Last Answer : a. Artificial Intelligence
Description : is a branch of science which deals with helping machine find solution to complex to problem in a more human like a fashion. (a) Artificial intelligence (b) Internet of think (c) Embided system (d) Cyber security
Last Answer : (a) Artificial intelligence
Description : Synonym of Internet is (1) Gopher (2) Intranet (3) Cyber Space (4) World Wide Web (WWW)
Last Answer : Cyber Space
Description : Is there a way to identify proxy IP addresses?
Last Answer : Any server can be set up as a proxy server with the right tweaking and tools, and there are a bunch of free ones out there. Just search google for free proxy server . They'll let you browse the web ... the FBI (probably) does it all the time, so it's definitely possible. Sorry I'm not much help!
Description : How do I determine which, if any, static IP addresses are being used on my home WiFi network?
Last Answer : Check the status page of your Router setup.
Description : Is it possible to block all traffic on a certain port except to two IP addresses?
Last Answer : It depends upon how flexible your router is. Use the router firmware to set this up. If your firmware isn’t sophisticated enough, try to find something like DWT or another good third-party router firmware program to update the one you have.
Description : Is there a way to block all IP addresses from a certain state from visiting a website?
Last Answer : Um, why? If you don’t mind my asking…
Description : Strange/multiple IP addresses from my iphone. Normal or hacked?
Last Answer : Google has servers all over the place. I don’t think you ever know where communications with them are going to seem like they are coming from.
Description : IP addresses are converted into (a) a binary string (b) alphanumeric string -Technology
Last Answer : (c) DNS translates domain names into their IP addresses and vice-versa.
Description : I found this in the Package Rules menu:
Last Answer : answer:
Description : SHOULD OLD/DORMANT EMAIL ADDRESSES BE DELETED FROMCURRENT IP?
Last Answer : Need Answer
Description : Membership in a VLAN can be based on _________. A) port numbers B) MAC addresses C) IP addresses D) all of theabove
Last Answer : all of theabove
Description : The logicaladdresses in theInternetarecalled _______ addresses. A) port B) IP C) Email D) noneof the above
Last Answer : IP