Question
a.
True
b.
False
c.
May be True or False
d.
Can't say
Posted under Cyber Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Strangers cannot cause much trouble if we connect to them over social media.
Similar Questions
Discover Related MCQs
Q. Part of the social media sites are the various games & 3rd party applications which helps ______________ to get access to your data.
View solution
Q. Many social media sites and services provide _______________ for legitimate account verification.
View solution
Q. Scanning your system and destroying suspicious files can reduce risks of data compromise or leakage of compromised data over social media.
View solution
Q. Different social media services offer tips as of how to use their services and site, still maintaining a high altitude of security.
View solution
Q. ______________ is populating the inbox of any target victim with unsolicited or junk emails.
View solution
Q. _________________ technique is also used in product advertisement.
View solution
Q. Which of the following is not a technique used by spanners?
View solution
Q. ___________ are used which crawl web pages looking for email Ids and copies them to the database.
View solution
Q. Which of the following is not a proper way of how spammers get the email Ids?
View solution
Q. There are ___________ major ways of spamming.
View solution
Q. There are _______ types of spamming.
View solution
Q. Which of the following is not a type of spamming attack?
View solution
Q. Which of the following is not a bulk emailing tool ?
View solution
Q. Which of the following is not a bulk emailing tool?
View solution
Q. Which of the following is not an anti-spam technique?
View solution
Q. Which of the following is not an anti-spam technique ?
View solution
Q. ___________ is a tool used as spam filter in association with email programs and automatically intercepts spam emails.
View solution
Q. Which of the following is not an anti-spamming tool or system?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cyber Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!