
E-Commerc (security network transaction)
Authored by Sangatamil A
others
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not the methods of Malware Identification used by Antivirus?
Signature-based detection
Configure browser security settings
Sandbox detection
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which kind of network security concerns includes someone listening to your private discussion with a secret microphone in your room or physically standing near your room's window?
Intrusion Problems
Denial of Service
Eavesdropping
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Cracked Softwares are another source of
E-mail attack
Virus attack
System protection
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements is true about modems?
Modems use the telephone lines
Modem stands for modulator and demodulator
Both 1 and 2
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following can act as a firewall?
Host server
Web server
Proxy server
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?