StudyWithMeenakshi

Search Your Topic Here

Monday, July 23, 2018

IIBF EXAM REVIEW : CYBER CRIME 23 July 2018


Please read diff type of controls

Digital signature, fines imposed

How many keys are involved in symmetric encryption

Diff between virus and worm

Phishing, stuxnet

Which technology is used to ensure that only authorised person can read the message?

Why hashing is used?

Netra was developed by?

Cyber crime is monitored by?

Who communicated with interpol?

Fine for noncompliance of guideline?

Cyber stalking, cyber terrorism

Hacking definition

Stylomery,

Ways to give strong password

Technology used to tackle keylogger

Blue hat hacker, white hacker

SQL injection

Where antivirus is placed

Smoke detector is IPS or IDS?

Rupay

Drone is developed by

5/7 case studies

Which card can't be skimmed

Card jamming

IT act 2000 and 2008 diff

Script kidder

Which virus attacked Microsoft in 2001

What plays an important role in digital signature

X called Y (a customer)  to give his

Credit card details. X told that he is the BM of the branch

What type of technique is this?

A) phishing

B) identity theft

C) telesmishing

D) hacking

Cyptolocker


No comments:

Post a Comment