Computer Applications
Related Questions
…………… involves an attack coupled with a demand for money to stop further attacks.
- Cyber stalking
- Cyber extortion
- Cyber bullying
- None of these
Which one of the following is not a password cracking technique?
- Dictionary Attack
- Spidering
- User Agent
- None of these
Mention the cyber crime in which the attacker harasses a victim by using the electronic communication.
- Cyber stalking
- Cyber espionage
- Cyber warfare
- None of these
Which software is designed to capture keystrokes without being identified by the user or security program?
- Ransomware
- Backdoors
- Keyloggers
- None of these