P Priyanka Tomar π Tutor III β 35.28K Points π Digital Business Q. is a person who breaks in or trespasses a computer system (A) Hacker (B) Snooper (C) operator (D) spoofer ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) Hacker
P Praveen Singh π Tutor III β 36.81K Points π Digital Business Q. A is an electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications (A) Digital signature (B) Digital certificates (C) SSL (D) none of these ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) Digital certificates
V Vinay π Mover β 28.75K Points π Digital Business Q. A provides a way to associate the message with the sender and is the equivalent of an ordinary signature. (A) cyber signature (B) Digital signature (C) SSL (D) none of these ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) Digital signature
V Vikash Gupta π Tutor III β 33.56K Points π Digital Business Q. is the reverse process of encryption, to make the information readable once again (A) Spoofing (B) Decryption (C) Sniffing (D) Cryptography ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) Decryption
R Ranjeet π Tutor III β 34.60K Points π Digital Business Q. is the process of making information unintelligible to the unauthorized user. (A) Spoofing (B) Snooping (C) Sniffing (D) Cryptography ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (D) Cryptography
G Gopal Sharma π Tutor III β 38.32K Points π Digital Business Q. attacks are difficult and are only successful if the attacker knows something about the shopper (A) Spoofing (B) Snooping (C) Sniffing (D) Guessing passwords ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (D) Guessing passwords
P Priyanka Tomar π Tutor III β 35.28K Points π Digital Business Q. The verification of credit card is done by using… with a communications link to the merchants acquiring bank (A) Credit card payment terminal (B) Point of Sale (C) All of these (D) none of these ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (C) All of these
P Priyanka Tomar π Tutor III β 35.28K Points π Digital Business Q. Prevents unauthorized communication into and out of the network, allowing the organization to enforce a security policy on traffic between its network and the internet. (A) Network firewall (B) Antivirus (C) both of these (D) none of these ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) Network firewall
R Ranjeet π Tutor III β 34.60K Points π Digital Business Q. acts like a gate keeper that examines each users identification before allowing them to enter to the organization’s internal networks. (A) Network firewall (B) Antivirus (C) both of these (D) none of these ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) Network firewall
V Vikash Gupta π Tutor III β 33.56K Points π Digital Business Q. A is a person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure. (A) Hacker (B) spoofer (C) operator (D) none of these ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) Hacker