information to hacker.
a. Spyware
b. Adware
d. None of these
c. Virus
involves an attack coupled with a demand for money to stop further attacks.
a. Cyber stalking
b. Cyber extortion
c. Cyber bullying
d. None of these
Which one of the following is not a password cracking technique?
a. Dictionary Attack b. Spidering
c. User Agent
d. None of these
In which year Cyber law was introduced?
a. 2009
b 2001
c. 2000
d. None of these
Mention the cybercrime in which the attacker harasses a victim by using the electronic communication
a. Cyber stalking b. Cyberespionage
c. Cyber warfare d. None of these
Which software is designed to capture keystrokes without being identified by the user or security progra
a. Ransomware
b. Backdoors
c. Keyloggers
d. None of these
Name the malware program that send unwanted advertisements to the user's computer which may d
user's working.
a. Spyware
b. Adware
c. Worm
d. None of these
Which program can create multiple copies of itself and can consume large portion of system memory?
b. Trojan horse
c. Rootkit
a. Worm
d. None of these
Answers
Answered by
1
Answer:
please mark me brainist
Explanation:
1.b Adwarr
2.d none of these
3.b Spidering
4.a 2009
Similar questions