logo

CuriousTab

CuriousTab

Discussion


Home General Knowledge Computer Comments

  • Question
  • The common name for the crime of stealing passwords is


  • Options
  • A. Spoofing
  • B. Surfing
  • C. Identity Theft
  • D. Speeling

  • Correct Answer
  • Spoofing 

    Explanation

    A spoofing attack is a situation in which one individual or program effectively disguises or mask as another by falsifying information and thereby gaining up an ill-conceived advantage. It may use for stealing password or IP addresses.

  • Tags: AIEEE, Bank Exams, CAT, GATE, Analyst, Bank Clerk, Bank PO, Database Administrator, IT Trainer, Network Engineer, Project Manager

    Computer problems


    Search Results


    • 1. What is amodem connected to?

    • Options
    • A. processor
    • B. mother board
    • C. printer
    • D. phone line
    • Discuss
    • 2. Which of the following is a true statement about Intranet and Internet ?

    • Options
    • A. Encryption is necessary
    • B. They use similar protocol
    • C. Speed is slow
    • D. They use the same protocol
    • Discuss
    • 3. What is the maximum number of characters when applying MsgBox and InputBox ?
    • Discuss
    • 4. Which type of memory is not directly addressable by the CPU and requires special software called EMS ?

    • Options
    • A. Expanded
    • B. Base
    • C. Conventional
    • D. None
    • Discuss
    • 5. What are the four main functions of a computer?

    • Options
    • A. Data, information, bits and bytes
    • B. Hardware, software, modeling and operations
    • C. Input, processing, output and storage
    • D. Learning, thinking, intelligence and virtuosity
    • Discuss
    • 6. The primary purpose of an operating system is ?

    • Options
    • A. To allow people to use the computer
    • B. To make computers easier to use
    • C. To keep systems programmers employed
    • D. To make the most efficient use of the computer hardware
    • Discuss
    • 7. What kind of attempts is made by individuals to obtain confidential information from a person by falsifying their identity ?

    • Options
    • A. Spyware scams
    • B. Phishing scams
    • C. Computer viruses
    • D. None
    • Discuss
    • 8. Why ABC computer is called so ?

    • Options
    • A. Because it was thought to be the first computer so named with first alphabets of English
    • B. Because it was developed by Atanasoff and Berry
    • C. Both of above are the reason to name the computer ABC
    • D. None of the above
    • Discuss
    • 9. Fifth generation computer is also known as

    • Options
    • A. Very Large Scale Integration (VLSI)
    • B. Knowledge information processing system
    • C. Both A & B
    • D. None of the above
    • Discuss
    • 10. By default, a real number is treated as a

    • Options
    • A. Integer
    • B. Float
    • C. Double
    • D. Long double
    • Discuss


    Comments

    There are no comments.

Enter a new Comment