Computer Science, asked by MAULIKSARASWAT, 5 months ago

I. Fill in the blanks:
1. Sometimes spam attackers keep sending bulk mails till the mail server gets full. This
practice is known as _________________.
2. ________________ are unwanted bulk e-mails that come from strange sources.
3. ____________ is one of the most sophisticated types of crime-ware applications that
perform a wide variety of automated tasks on behalf of the cyber criminals.
4. _______________ programs are used to check user’s keystrokes and get important
information, such as passwords, etc.
5. _________________ refers to psychological manipulation of people into performing
actions or divulging confidential information.
6. The URL of a secured website starts with ____________ and your browser displays an
icon of the closed lock.
II. Answer the following questions.
1. What is Vishing?
2. How to identify spam?
3. Define the term Cookies.
4. What do you understand by the Individual Right to Privacy?
5. Explain the measure to protect Intellectual Property Rights.

Answers

Answered by utsavsharma2005
1

Answer:

1. Spamming

2. Spam mails

3. Crimeware

4. Keylogger

5. Social Engineering

6. https

II 1. Vishing is a cybercrime that uses the phone to steal personal confidential information from victims. Often referred to as voice phishing, cybercriminals use savvy social engineering tactics to convince victims to act, giving up private information and access to bank accounts.

2. nsure that you know the sender before opening an email

There's a good chance that it is spam. Another possible way to identify a spam is when the sender's address has a bunch of numbers or a domain that you don't recognise (the part after the "@") then the email is likely spam

Answered by satyamkumar5428
1

Explanation:

I don't think that anyone will answer this much of questions

Similar questions