P

Priyanka Tomar • 35.28K Points
Coach

Q. This is the forging of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.

(A) Foot printing
(B) Non repudiation
(C) E-mail spoofing
(D) Finger

Correct Answer - Option(C)

Share

Discusssion

Login to discuss.

Be the first to start discuss.

Related Posts


Q. This is the encryption algorithm that will begin to supplant the Data Encryption Standard (DES) - and later Triple DES - over the next few years as the new standard encryption algorithm.

Q. This is a Peripheral Component Interconnect (PCI) card that offloads SSL processing to speed up secure transactions on e-commerce Web sites.

Q. This is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding cipher text value and vice versa.

Q. This is the name for a group of programmers who are hired to expose errors or security holes in new software or to find out why a computer network's security is being broken.

Q. This is a type of network security attack in which the intruder takes control of a communication between two entities and masquerades as one of them.

Q. This is the forging of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.

Q. When discussing IDS/IPS, what is a signature?

Q. This is the modification of personal information on a Web user's computer to gain unauthorized information with which to obtain access to the user's existing accounts.

Q. In what type of attack does an intruder manipulate a URL in such a way that the Web server executes or reveals the contents of a file anywhere on the server, including those lying outside the document root directory?

Q. An intruder might install this on a networked computer to collect user ids and passwords from other machines on the network.

View All Posts