1 |
------- is a technique used by cyber criminals to gain the information from the dividuals. |
Cracking
Bullying
Social Engineering
Spamming
|
2 |
---------------- refers to the act of breaking into systems to steal or distroy data. |
Spamming
Hacking
Cracking
Cyber troll
|
3 |
It refers to the spoolingof bulk mail by an unidentified source. |
Spamming
Phishing
Hacking
Cyber Troll
|
4 |
The best defence against............ assaults is human intellect and comprehension. |
Phishing
Spamming
Hacking
Social engineering
|
5 |
At its ismplest, ......... is a sysgtem of moral principles. |
Ethics
Digital Environment
E-mail spoofing
None of these
|
6 |
The Website or programs known as..... is where users can share their content. |
Internet
Social Media
Meta
e- learning
|
7 |
Learning conducted via electronic media typicaly on internet is called. |
Blog
Meta
Web-service
e-learning
|
8 |
------------- are virtual diaries created by people for share their hobbies, thoughts with like minded people. |
Internet
Meta
Spam
Blogs
|
9 |
The----- provides you the sebrvices of online shopping, education and etc. |
Network
Internet
Both a and b
None of these
|
10 |
Which of the following are not transaction fraud. |
Identity theft
Cyber troll
Job Fraud
Banking Fraud
|