Network Security

IMPORTANT

Network Security: Overview

This topic covers concepts, such as, Computer and Network Security etc.

Important Questions on Network Security

EASY
IMPORTANT

Which of the following is NOT a good Web security strategy?

EASY
IMPORTANT

It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.

EASY
IMPORTANT

A vulnerability scanner is _____.

EASY
IMPORTANT

This hacker is someone outside computer security consulting firms that used to bug test a system before its launch, looking for exploits so they can be closed. he is called___.

EASY
IMPORTANT

Viruses that fool a user into downloading or executing them by pretending to be useful applications are also sometimes called _____.

EASY
IMPORTANT

Which is primarily the result of a thorough understanding of information about an enterprise?

EASY
IMPORTANT

This hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted.

EASY
IMPORTANT

It is a software program designed to record ('log') every keystroke on the machine on which it runs.

EASY
IMPORTANT

These are program designed as to seem to being or be doing one thing, but actually being or doing another.

EASY
IMPORTANT

_____ is the industry standard name for the first computer virus for MS-DOS. 

EASY
IMPORTANT

________ ‘are attempts by individuals to obtain confidential information from you by falsifying their identity.

EASY
IMPORTANT

_____ is the industry standard name for the first computer virus for MS-DOS.