Which of the following Wi-Fi chalking methods refers to drawing symbols in public places to advertise open Wi-
Which of the following Wi-Fi chalking methods refers to drawing symbols in public places to advertise
open Wi-Fi networks?
Steganography is a technique of hiding a secret message within an ordinary message and extracting it at the de
Steganography is a technique of hiding a secret message within an ordinary message and extracting it
at the destination to maintain the confidentiality of data.
Identify the attack from following sequence of actions?
Identify the attack from following sequence of actions? Step 1: A user logs in to a trusted site and
creates a new session. Step 2: The trusted site stores a session identifier for the session in a cookie in
the web browser. Step 3: The user is tricked to visit a malicious site. Step 4: the malicious site sends a
request from the user’s browser using his session cookie.
The router stores log files in the____________.
Router log files provide detailed Information about the network traffic on the Internet. It gives information
about the attacks to and from the networks. The router stores log files in the____________.
What is the size limit for Recycle Bin in Vista and later versions of the Windows?
The Recycle Bin is located on the Windows desktop. When you delete an item from the hard disk,
Windows sends that deleted item to the Recycle Bin and the icon changes to full from empty, but items
deleted from removable media, such as a floppy disk or network drive, are not stored in the Recycle Bin.
What is the size limit for Recycle Bin in Vista and later versions of the Windows?
Which of the following is not an example of a cyber-crime?
Which of the following is not an example of a cyber-crime?
Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where, “X” represents the
Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where, “X” represents
the _________.
Which of the following statement is not correct when dealing with a powered-on computer at the crime scene?
Which of the following statement is not correct when dealing with a powered-on computer at the crime
scene?
Tracks numbering on a hard disk begins at 0 from the outer edge and moves towards the center, typically reachi
Tracks numbering on a hard disk begins at 0 from the outer edge and moves towards the center,
typically reaching a value of ___________.
Which type of correlation will you use if your organization wants to use different OS and network hardware pla
Event correlation is a procedure that is assigned with a new meaning for a set of events that occur in a
predefined interval of time. Which type of correlation will you use if your organization wants to use
different OS and network hardware platforms throughout the network?