adplus-dvertising
frame-decoration

Question

An indirect form of surveillance.

a.

Honey pot

b.

Logical

c.

Security

d.

Intrusion

Answer: (a).Honey pot

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. An indirect form of surveillance.

Similar Questions

Discover Related MCQs

Q. A malicious code hidden inside a seemingly harmless piece of code.

Q. Attack in which a user creates a packet that appears to be something else.

Q. A technique in which a program attacks a network by exploiting IP broadcast addressing operations.

Q. An attack in which the user receives unwanted amount of e-mails.

Q. These ciphers replace a character or characters with a different character or characters, based on some key.

Q. Encryption is the study of creating and using decryption techniques.

Q. A type of cipher that uses multiple alphabetic strings.

Q. An encryption technique with 2 keys is ______________

Q. In public key cryptography, a key that decrypts the message.

Q. DES stands for?

Q. Under DES, the data encryption standard took a 64-bit block of data and subjected it to ______ levels of encryption.

Q. Triple-DES has ______ keys.

Q. Encryption standard that is selected by the US government to replace DES.

Q. An electronic document that establishes your credentials when you are performing transactions.

Q. ___________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks.

Q. In a database where the encryption is applied the data is cannot be handled by the unauthorised user without

Q. Which of the following is not a property of good encryption technique ?

Q. In which of the following encryption key is used to encrypt and decrypt the data ?

Q. Encryption of small values, such as identifiers or names, is made complicated by the possibility of __________

Q. Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it ?