Network Security
Network Security: Overview
This topic covers concepts, such as, Computer and Network Security etc.
Important Questions on Network Security
Nowadays Vishing has become a criminal practice of using social engineering over which of the following?

Which of the following is not a malware?

A computer virus normally attaches itself to another computer program known as a:

Hacking refers to the

Unauthorized copying of software to be used for personal gain instead of for personal backups is called
1. program thievery
2. data snatching
3. software piracy
4. program looting
5. data looting

Which of the following is a factor in cyberspace that provides the offenders the choice to commit cyber crime?

Which of the following is a theory proposes “Identity Flexibility, Dissociative Anonymity and lack of deterrence factor in cyberspace provides the offenders the choice to commit cyber crime.

What is Ethical Hacking?

Which of the following is not an example of Phishing Fraud?

When did the first computer virus appear?

Data Security Council of India was founded in _____.

Which of the following is correlated with the operation of converting ordinary text language into coded text language and vice-versa for the security of data?

_____ is the process of verification of a login name and password through an individual.

The first computer virus was named _____.

When a hacker contacts your phone or E-mails and attempts to acquire your personal details and password, it is called _____.

The biggest challenges, when it comes to cyber crimes are?

Phishing is an attempt to acquire :

Match the Column I and Column II.
Column I | Column II |
A. Firewall | 1. Guard the data. |
B. Data security. | 2. Detect and delete harmful spyware. |
C. Antispyware | 3. Guard the network. |
D. Multimedia | 4. Consist of text, graphic images and animation. |
Codes

Which is another name for functional language?

Which of the following virus overtake computer system when it boots and destroy information?
