An email bomb is also known as a ___
a) Letter bomb
b) Internet
c) Banner
d) Attack

1 Answer

Answer :

a) Letter bomb

Related questions

Description : Banner grabbing is often used for a) White hat hacking b) Black hat hacking c) Gray hat hacking d) Scepit Kiddies

Last Answer : a) White hat hacking

Description : An attacker can create an _____attack by sending hundreds or thousands of email with very large attachments a) Connection Attacks b) Auto responder attacks c) Attachment Overloading Attacks d) All of the above

Last Answer : c) Attachment Overloading Attacks

Description : Cross Site Scripting is also shortly khown as a) XSS b) HTTP c) HTTPS d) DNS

Last Answer : a) XSS

Description : Which of the following is an Email attack : a. Hacking b. Decrypting c. Bomb d. Banner

Last Answer : d. Banner

Description : SNMP port is a) 37 b) 53 c) 111 d) 161

Last Answer : d) 161

Description : ___for ping sweeps and port scanning a) Sam Spade b) SuperScan c) NetScan d) NetCat

Last Answer : b) SuperScan

Description : What port number does HTTP use a) 53 b) 69 c) 80 d) 79

Last Answer : c) 80

Description : What port number does DNS use a) 37 b) 53 c) 69 d) 79

Last Answer : b) 53

Description : SNMP stands for a) Simple Networks Messaging Protocol b) Simple Networks Mailing Protocol c) Simple Networks Management Protocol d) Simple Networks Master Protocol

Last Answer : c) Simple Networks Management Protocol

Description : Which of the following tools is used for Networks Testing and port Scanning a) NetCat b) SuperScan c) NetScan d) All of Above

Last Answer : d) All of Above

Description : Letter bomb is also known as a. Official bomb b. Hacking bomb c. Mail bomb d. E-mail bomb

Last Answer : d. E-mail bomb

Description : Which attack allows the attacker to execute the scripts on the victim’s browser? a. SSL attack b. Cookie attack c. Banner grabbing d. XSS attack

Last Answer : d. XSS attack

Description : A bomb explodes on the moon. You will hear its sound on earth after ___

Last Answer : ou cannot hear the sound of explosion 514.

Description : If you were in midflight and a terrorist tried to bomb the plane, or tried to attack or harm people, what role might you play?

Last Answer : E) and F) I don’t know if I am strong enough to take down a terrorist myself, but I do think I could help plot with other passengers to come up with a plan. Also, I think all pilots have guns in the cockpits now. I always carry perfume (flammable), tweezers, a cuticle remover, both are very sharp.

Description : What is the background of the bomb attack in Sri Lanka in 2019 ?

Last Answer : Sri Lanka has a long history of terrorism. Most of the attacks were carried out by the Liberation Tigers of Tamil Eelam (LTTE) and the Marxist-Leninist , Communist Party Janata Mukti Peramuna (JVP). The ... end of Sri Lanka's civil war in 2009 that the country has witnessed a major militant attack.

Description : The term used to describe a terrorist attack on a computer information system is- a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the these

Last Answer : b. Cyber Terrorism

Description : The term used to describe a terrorist attack on a computer information system is a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the these

Last Answer : b. Cyber Terrorism

Description : Usually downloaded into folders that hold temporary internet files, _____ are written to your computer's hard disk by some of the websites you visit. a) anonymous files b) behaviour files c) banner ads d) cookies e) None of these

Last Answer : d) cookies

Description : ___ soil is also known by different names like Reh, Kallar and Usar? a Peaty and Marshy Soils b Saline and Alkaline Soil c Red soils d Alluvial Soil e Laterite Soil

Last Answer : c Red soils

Description : A copy compared with a copy of a letter made by a copying machine is ___  evidence of the contents of the letter (a) Documentary (b) Primary (c) Secondary (d) None of these.

Last Answer : (c) Secondary

Description : Amazon.com is well‐known for which e‐commerce marketing technique? a. Banner ads b. Pop‐up ads c. Affiliate programs d. Viral marketing

Last Answer : c. Affiliate programs

Description : A basic solution which also satisfies the condition in which all basic variables are non-negative is called ___ a. Basic feasible solution b. Feasible solution c. Optimal solution d. None of the above

Last Answer : a. Basic feasible solution

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : A. Remote attack

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : D. Internal attack

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack?  Local access  Remote attack  Internal attack  Physical access

Last Answer :  Remote attack

Description : hen a hacker attempts to attack a host via the Internet it is known as what type of attack? a. Local access b. Remote attack c. Internal attack d. Physical access

Last Answer : b. Remote attack

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : A. Remote attack

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? ∙ A. Remote attack ∙ B. Physical access ∙ C. Local access ∙ D. Internal attack

Last Answer : A. Remote attack

Description : One advantage of dial-up-internet access is ___ 1) It utilises broadband technology 2) It utilizes existing telephone service 3) It uses a router for security 4) Modem speeds are very fast 5) None of these

Last Answer : Answer :2

Description : The Dialup connections to access the internet uses ___ protocol. a. PPP (Point to Point protocol) b. X.25 protocol c. PLIP protocol d. None

Last Answer : a. PPP (Point to Point protocol)

Description : Net crime is criminal exploitation of the ___: a) Browsers b) Servers c) Internet d) None of These

Last Answer : c) Internet

Description : Net crime is criminal exploitation of the ___: a) Browsers b) Servers c) Internet d) None of These

Last Answer : c) Internet

Description : 8-Unsolicited email is also known as _____. Choose one of the following to complete the sentence: Exhibit: Mark one answer: Junk Bulk Trash Spam

Last Answer : Spam

Description : Does the banner on a new book, "New York Times Best Seller" mean anything at all any more?

Last Answer : I don’t read best sellers unless they are recommended from Amazon or radio or television. I usually stick to the same authors or subjects.

Description : Why do we not sing the 3rd and 4th verses of the Star Spangled Banner?

Last Answer : We don’t even sing the second verse. And, at the request of US Television, they don’t play the whole tune of the first verse at the Olympics; they play a shortened version.

Description : How do you know when a banner comes up saying you have to notify someone for being hacked is fake?

Last Answer : answer:They are all fake. Trust your own software you installed onto your computer yourself. There is not one single outside source that knows whether or not you've been infected. Only the anti-virus software you ... know fully what's on it. You have to get into the computer to know what's on it.

Description : Is it accepted religious teaching to shoot people who don't stand for the Star Spangled Banner?

Last Answer : There are crazies in all walks of life, not just religious folks in Alabama.

Description : The Wasps are flying in carrying a congratulations banner: CONGRATS CWOTUS!

Last Answer : answer:Mazel Tov @CWOTUS and all the blue insects that proceeded this incarnation. Although your politics are sketchy :-), your word wisdom, compassion for the young and knowledge add much to the collective. Sail on, my friend – sail on!

Description : What does your banner read? [Details inside].

Last Answer : My banner reads Save our schools, but I am at a No new taxes rally. Totally incompatible.

Description : Should this atheist group be permitted to have their banner hung with the nativity display in Pennsylvania?

Last Answer : This is a difficult question. Had the banner stopped with the first sentence, I would have said “go for it”. I need to think on this some more.

Description : Silly question #88 : If you are like Bruce "The Hulk" Banner who turns into this creature when angry, what would your creature be?

Last Answer : I’d turn into Rational Argument Man!

Description : Are you impressed if someone can hit the high note in The Star Spangled Banner?

Last Answer : Yes, if they can actually hit it and not screech it. I’m more impressed when they don’t try to sing it like a long, drawn out, melodramatic ballad.

Description : Any scrolling LED banner applications for windows?

Last Answer : Desktop Sprite for TOEFL iBT Words

Description : What strength of velcro is needed to adhere a vinyl banner to an outdoor tent?

Last Answer : answer:How big are the banners? What kind of wind loading might they see? Will they have to stay in place in case of rain? Are all surfaces flat? Do you want a stick on or sew on ... manufacturing or sales rep for Velcro™ products (all over the Web) and start with the answers to those questions.

Description : Where can I find someone who can design a Flash banner involving actionscripting?

Last Answer : Perhaps guru.com, odesk.com, or just post a gig (for free) on Craig’s list. I recently posted a gig for a GIS specialist and I was amazed by the quality of responses I got.

Description : Could someone tell me how many images I should have on the banner of my home page?

Last Answer : Something smells like spam in here…

Description : Do you need to have a minimum amount of site traffic to have Google Adsense (including Google banner ads from adsense) to have this service on your website?

Last Answer : I don’t think it matters, you just won’t make much money.

Description : What's the average CPM for banner ads?

Last Answer : It depends on the traffic. Not only how many, but also if they are recurring or new. Do you know the rate of unique users, in relation to repeats? Most ads I’ve seen cost a few cents per viewing, with an additional charge per click.

Description : If my banner is 32.25x85 how do I get stockphoto that will fit it?

Last Answer : It will get pixelated, because you are stretching the maximum size of the largest image.