Que.Fixing of security vulnerabilities in a system by additional programs is known as __________ patches.
|
a. hacking |
b. database |
c. server |
d. security |
Que.Known bugs can be solved or removed by __________________ develop by the vendors of the application.
|
a. removing the application |
b. changing the software |
c. installing security patches |
d. installing database patches |
installing security patches
Que.___________________ are some very frequent updates that come for every anti-virus.
|
a. Patch update |
b. Data update |
c. Code update |
d. Definition update |
Que.National Vulnerability Database (NVD) is _________________ repository of data regarding vulnerability standards.
|
a. U.S. government |
b. India government |
c. Russian government |
d. China Government |
Que.CVE is a directory of lists of publicly recognized information security vulnerabilities as well as exposures.
|
a. True |
b. False |
c. May be True or False |
d. Can’t say |
Que.Which of the following is not a type of cyber crime?
|
a. Data theft |
b. Forgery |
c. Damage to data and systems |
d. Installing antivirus for protection |
Installing antivirus for protection
Que.Cyber-laws are incorporated for punishing all criminals only.
|
a. True |
b. False |
c. May be True or False |
d. Can’t say |
Que.Cyber-crime can be categorized into ________ types.
|
a. 4 |
b. 3 |
c. 2 |
d. 6 |
Que.Which of the following is not a type of peer-to-peer cyber-crime?
|
a. Phishing |
b. Injecting Trojans to a target victim |
c. MiTM |
d. Credit card details leak in deep web |
Credit card details leak in deep web
Que.Which of the following is not an example of a computer as weapon cyber-crime?
|
a. Credit card fraudulent |
b. Spying someone using keylogger |
c. IPR Violation |
d. Pornography |
Spying someone using keylogger