Computer Security
- Junk E-mail is also called
-
View Hint View Answer Discuss in Forum
NA
Correct Option: A
NA
- Which one of the following is a key function of firewall ?
-
View Hint View Answer Discuss in Forum
NA
Correct Option: A
NA
- Which of the following is a criminal activity attempting to acquire sensitive information such as passwords, credit cards, debits by masquerading as a trustworthy person or business in an electronic communication ?
-
View Hint View Answer Discuss in Forum
NA
Correct Option: B
NA
- A firewall operated by
-
View Hint View Answer Discuss in Forum
NA
Correct Option: C
NA
- Which one of the following is a cryptographic protocol used to secure http connections ?
-
View Hint View Answer Discuss in Forum
NA
Correct Option: B
NA