Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Mail bomb
B) Spam
C) Intellectual spam
D) Junk mail
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Crackers
B) Black-hat hacker
C) Hoaxes
D) Cyberterrorists
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) An Insider
B) Dumpster diving
C) Social engineering
D) Phishing
Correct Answer
verified
Multiple Choice
A) Opt out
B) Website name stealing
C) Internet censorship
D) Teergrubing
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Counterfeit software
B) Pirated software
C) Ethical software
D) Governance software
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Digital certificate
B) Encryption
C) Decryption
D) Cryptography
Correct Answer
verified
Showing 141 - 160 of 344
Related Exams