Tuesday, April 11, 2006

Pre course test

Digital crimes workshop

APPA

  1. Transforming the original data into scrambled one which does not make any sense to the viewer
    1. enciphering
    2. crypto ciphering
    3. encryption
    4. endocryption [c]
  2. a fake server to trap an unwitting intruder
    1. hotpots
    2. sweatpots
    3. millipots
    4. honeypots [d]
  3. a hacking plotter using internet can be traced using
    1. Aladdin lantern
    2. Magic lantern
    3. Magic wand
    4. Midas lantern [d]
  4. breaking and cracking encryption
    1. cipher analysis
    2. crypto analysis
    3. cyber analysis
    4. crypto graphy [a]
  5. cyber defamation is punishable under IT ACT 2000 true/false [ F]
  6. on net information about new products, services and investment opportunities to the users is provided through
    1. newsboards
    2. electronic boards
    3. bulleting boards
    4. electronic bulletin boards [d]
  7. chain letters with promise of quick profits using home computer
    1. chain scheme
    2. pyramid scheme
    3. profit scheme
    4. pirated scheme [b]
  8. mechanism used to protect network from unauthorized access while allowing users within to access the public internet
    1. fireways
    2. gatewalls
    3. firewalls
    4. gateways [c]
  9. a program providing automatic protection to internet privacy and security
    1. watch dog
    2. guard dog
    3. vigilant dog
    4. sniffer dog [b]
  10. spying on the sensitive information of an adversary network from home computer
    1. data espionage
    2. data diddling
    3. data spying
    4. data ciphering [c]
  11. viruses that change their forms to look different
    1. deceptive viruses
    2. cloned viruses
    3. polymorphic viruses
    4. poly cloned viruses [c]
  12. viruses that hide in some other program making the target system do some unauthorized functions
    1. trapdoor
    2. logic bomb
    3. Trojan horse
    4. Polymorphic virus [c]
  13. siphoning off a fraction of the amount processed by the processing program
    1. salam logic
    2. salami logic
    3. salim logic
    4. salmi logic [b]
  14. online harassment is called
    1. cyber stalking
    2. computer talking
    3. chatting
    4. cyber squatting [a]
  15. electronically disguising one computer as another for gaining access to a restricted system is
    1. spooling
    2. sniffing
    3. spoofing
    4. sfooling [c]

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

0 Comments:

Post a Comment

<< Home