Computer Security
-  Junk E-mail is also called
- 
                        View Hint View Answer Discuss in Forum NA Correct Option: ANA 
-  Which one of the following is a key function of firewall ?
- 
                        View Hint View Answer Discuss in Forum NA Correct Option: ANA 
-  Which of the following is a criminal activity attempting to acquire sensitive information such as passwords, credit cards, debits by masquerading as a trustworthy person or business in an electronic communication ?
- 
                        View Hint View Answer Discuss in Forum NA Correct Option: BNA 
-  A firewall operated by
- 
                        View Hint View Answer Discuss in Forum NA Correct Option: CNA 
-  Which one of the following is a cryptographic protocol used to secure http connections ?
- 
                        View Hint View Answer Discuss in Forum NA Correct Option: BNA 
 
	