Network Security

IMPORTANT

Network Security: Overview

This topic covers concepts, such as, Computer and Network Security etc.

Important Questions on Network Security

MEDIUM
IMPORTANT

Nowadays Vishing has become a criminal practice of using social engineering over which of the following?

MEDIUM
IMPORTANT

Which of the following is not a malware?

EASY
IMPORTANT

A computer virus normally attaches itself to another computer program known as a:

MEDIUM
IMPORTANT

Hacking refers to the

MEDIUM
IMPORTANT

Unauthorized copying of software to be used for personal gain instead of for personal backups is called
1. program thievery
2. data snatching
3. software piracy
4. program looting
5. data looting

MEDIUM
IMPORTANT

Which of the following is a factor in cyberspace that provides the offenders the choice to commit cyber crime?

MEDIUM
IMPORTANT

Which of the following is a theory proposes “Identity Flexibility, Dissociative Anonymity and lack of deterrence factor in cyberspace provides the offenders the choice to commit cyber crime.

HARD
IMPORTANT

What is Ethical Hacking?

MEDIUM
IMPORTANT

Which of the following is not an example of Phishing Fraud?

MEDIUM
IMPORTANT

When did the first computer virus appear?

MEDIUM
IMPORTANT

Data Security Council of India was founded in _____.

MEDIUM
IMPORTANT

Which of the following is correlated with the operation of converting ordinary text language into coded text language and vice-versa for the security of data?

MEDIUM
IMPORTANT

_____ is the process of verification of a login name and password through an individual.

MEDIUM
IMPORTANT

The first computer virus was named  _____.

MEDIUM
IMPORTANT

When a hacker contacts your phone or E-mails and attempts to acquire your personal details and password, it is called _____.

HARD
IMPORTANT

The biggest challenges, when it comes to cyber crimes are?

HARD
IMPORTANT

Phishing is an attempt to acquire :

EASY
IMPORTANT

Match the Column I and Column II.

Column I Column II
A. Firewall 1. Guard the data.
B. Data security. 2. Detect and delete harmful spyware.
C. Antispyware 3. Guard the network.
D. Multimedia 4. Consist of text, graphic images and animation.

Codes

EASY
IMPORTANT

Which is another name for functional language?

EASY
IMPORTANT

Which of the following virus overtake computer system when it boots and destroy information?