What kind of attempts is made by individuals to obtain confidential information from a person by falsifying their identity?
Answer: A
No answer description available for this question
Enter details here
When a logic bomb is activated by a time related event, it is known as -------
Answer: B
No answer description available for this question
Enter details here
Which of the following would most likely not be a symptom of a virus?
Answer: B
No answer description available for this question
Enter details here
…………….. are used in denial of service attacks, typically against targeted web sites.
Answer: B
No answer description available for this question
Enter details here
What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?
Answer: D
No answer description available for this question
Enter details here
Which among the following is an anti-virus program
Answer: D
No answer description available for this question
Enter details here
Which of the following virus overtake computer system, when it boots and destroy information?
Answer: A
No answer description available for this question
Enter details here
Which of the following is/are threats for electronic payment systems?
Answer: D
No answer description available for this question
Enter details here
If you receive an email claiming to need your username and/or password, what should you do?
Answer: A
No answer description available for this question
Enter details here
You just got a new computer which has antivirus software already installed. Is it safe to use on the internet immediately?
Answer: A
No answer description available for this question
Enter details here