Computer Security


  1. Junk E-mail is also called











  1. View Hint View Answer Discuss in Forum

    NA

    Correct Option: A

    NA


  1. Which one of the following is a key function of firewall ?











  1. View Hint View Answer Discuss in Forum

    NA

    Correct Option: A

    NA



  1. Which of the following is a criminal activity attempting to acquire sensitive information such as passwords, credit cards, debits by masquerading as a trustworthy person or business in an electronic communication ?











  1. View Hint View Answer Discuss in Forum

    NA

    Correct Option: B

    NA


  1. A firewall operated by











  1. View Hint View Answer Discuss in Forum

    NA

    Correct Option: C

    NA



  1. Which one of the following is a cryptographic protocol used to secure http connections ?











  1. View Hint View Answer Discuss in Forum

    NA

    Correct Option: B

    NA