The unauthorized activities of malicious software is called __________
A virus _______is a false warning about a computer virus.
A malware program that can be used by a black hat cracker to remotely take control of a system for further attacks like spam emails or Denial of Service attacks, without a userâ??s knowledge is called ________
Consider the following statements1. Computer worm uses a computer network to send copies of itself to other nodes without any user intervention.2. Like a virus, worm needs to attach itself to an existing program.Which of the statements given above is/are correct?
The phrase _________describes viruses, worms, Trojan horse attack applets, and attack scripts.
The creation of Internet Protocol (IP) packets with a forged source IP address, with the purpose of concealing the identity of the sender or impersonating another computing system is called _________
__________ is an electronic fraud tactic in which individuals are tricked into revealing critical financial or personal information to unauthorized entities over the telephone.
Hardware or software designed to guard against unauthorized access to a computer network is known as ________
Sending large numbers of unwanted e-mail messages to a single recipient or to a group of such recipients is termed as ___________
........ is one reason for problems of data integrity.