Computer Science, asked by nikhilabhay48, 9 months ago

information to hacker.
a. Spyware
b. Adware
d. None of these
c. Virus
involves an attack coupled with a demand for money to stop further attacks.
a. Cyber stalking
b. Cyber extortion
c. Cyber bullying
d. None of these
Which one of the following is not a password cracking technique?
a. Dictionary Attack b. Spidering
c. User Agent
d. None of these
In which year Cyber law was introduced?
a. 2009
b 2001
c. 2000
d. None of these
Mention the cybercrime in which the attacker harasses a victim by using the electronic communication
a. Cyber stalking b. Cyberespionage
c. Cyber warfare d. None of these
Which software is designed to capture keystrokes without being identified by the user or security progra
a. Ransomware
b. Backdoors
c. Keyloggers
d. None of these
Name the malware program that send unwanted advertisements to the user's computer which may d
user's working.
a. Spyware
b. Adware
c. Worm
d. None of these
Which program can create multiple copies of itself and can consume large portion of system memory?
b. Trojan horse
c. Rootkit
a. Worm
d. None of these​

Answers

Answered by sanjitakumarasima158
1

Answer:

please mark me brainist

Explanation:

1.b Adwarr

2.d none of these

3.b Spidering

4.a 2009

Similar questions