MCQs
Total Questions : 66
| Page 1 of 7 pages
Answer: Option B. -> hacker
Answer: Option B. -> phishing
Answer: Option B. -> cyber
Answer: Option C. -> IP spoofing
Answer: Option A. -> Trojan horses
Answer: Option A. -> a prepared application that takes advantage of a known weakness.
Answer: Option C. -> a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
Answer: Option A. -> Stealth
Answer: Option B. -> Transport Layer Security (TLS)