Please read diff type of controls
Digital signature, fines imposed
How many keys are involved in symmetric encryption
Diff between virus and worm
Phishing, stuxnet
Which technology is used to ensure that only authorised person can read the message?
Why hashing is used?
Netra was developed by?
Cyber crime is monitored by?
Who communicated with interpol?
Fine for noncompliance of guideline?
Cyber stalking, cyber terrorism
Hacking definition
Stylomery,
Ways to give strong password
Technology used to tackle keylogger
Blue hat hacker, white hacker
SQL injection
Where antivirus is placed
Smoke detector is IPS or IDS?
Rupay
Drone is developed by
5/7 case studies
Which card can't be skimmed
Card jamming
IT act 2000 and 2008 diff
Script kidder
Which virus attacked Microsoft in 2001
What plays an important role in digital signature
X called Y (a customer) to give his
Credit card details. X told that he is the BM of the branch
What type of technique is this?
A) phishing
B) identity theft
C) telesmishing
D) hacking
Cyptolocker
No comments:
Post a Comment