____________ is used to describe those hackers who use their computer...
A ___________ is a private network of computers that uses the public...
______________ refers to a kind of electronic civil disobedience in...
An ____________ gathers and analyzes information from various areas...
______________ refers to the pre-attack phase when the attacker scans...
________________ can be said to be a security violation that results...
The BIOS program is usually in the _______memory location
The __________ is a semi-trusted network zone that separates the...
The authentication process is done by exchanging a set of messages...
____________ of the e-mail message has key role to play in e-mail...
HPFS is acronym for___________
Choose the most appropriate definition for Cybercrime. Cybercrime is...
The ___________ is a unique identifier that is used to establish, and...
________ is a program and/or device that monitors data traveling over...
RADIUS, TACAS, IKE are _________
The objective of ______________ is to authenticate based on username,...
In a ____________________, the IDS examine activity on each individual...
__________ is the technique attackers use to gain access to a network,...
E-mail crime can be categorized in two ways: one committed by sending...
Which options should be turned on in a wireless network to make it...
__________ is the act of obtaining unauthorized access to a network by...
The most damaging of the denial of service attacks can be a...
_________ is a program that appears to be legitimate but is designed...
____________ defines the way in which messages are transmitted over...
__________ is the art and science of hiding information by embedding...
IPSec aids two encryption modes:
Running a program that remotely finds ports opened and closed on...
__________ is a system integrity check tool.
Logs can help in event reconstruction as they are_______
When there is sufficient power the computer looks for the ______for...
___________ is a computer that is completely vulnerable to attacks.
____________ is a proxy server that doesn't have special caching...
A _____________ is an application program that is used to identify an...
_______________ refers to the preparatory phase where an attacker...
Investigators must document digital evidence by creating an...
A __________ is simply a program, or hardware device, that protects...
_____________ detects and drops packets that overload the server
Common digital signature algorithms that are used include ______
In a ____________________, the IDS examine activity on each individual...
A ___________is any circumstance or event that has the potential to...
Any ____________involves three phases – preparation, conduct and...
____________should begin with the identification of audience and...
______ is defined as the protection of networks and their services...
_____________ layer deals with the mechanical, electrical, procedural...
___________ is a defined way to breach the security of an IT system...
A ____________ indicates successful access gained by the user and...
__________ is a means for ensuring private, secure communication...
During the power on self-test various tests are performed including:
The basic function of ___________is transmission of data over the...
___________ is an incident process in which a person or software...
An ______________is a person who can investigate on a particular case,...
_______ is a malicious program that replicates it self until it fills...
Cyber Crime is divided into the two T's
______________are those that violate the confidentiality without...
_____________ monitors system files to determine whether an intruder...
__________ has been defined as an assault on system security that...
______ is an online utility that helps an investigator/user to search...
___________ contain events generated by system component and deals...
The computer forensic investigator must maintain ___________whenever a...
___________is a file system designed specifically for the OS/2...
An ________can be an event or set of events that threatens the...
___________ is also known as misuse detection and tries to identify...
Network forensics poses greater challenges as:
Proxy based firewalls concentrate on the _____________ rather than...
WEP stands for ____________
___________ is a computer program that is designed to replicate itself...
________ is a procedure by which a router changes data in packets to...
_______________firewalls concentrates on individual packets and...
______ is a standard for encrypting and digitally signing electronic...
The __________________ characterizes the organization's idea of an apt...
_________ determines what type of resources can be accessed per user...
_____________ is an incident in which a system does not behave as it...
__________ mainly involve government agencies that are responsible for...
_________ is a program that handles external servers on behalf of...
Computer crimes pose certain challenges to solving the crime. These...