Contents

A process of sending high volume of requests to a system so the system cannot hand legitimate users is called…….
a) data diddling
b) zapping
c) denial of service            
d) bombing


c

A program placed for legitimate program for unauthorized and hidden access to system is called……
a) worm
b) worm
c) trapdoor
d) bomb


c

If a legitimate user does not log off from system, an illegitimate user may be involved…
a) piggy backing
b) zapping
c) scavenging                       
d) trapdoor


a

Zapping software is used for…….
a) bypass security system
b) checking virus on system
c) destroy sensitive data    
d) none of these

a

A technique to get small amount of money illegally from large financial system is…….
a) salami                               

b) piggybacking
c) zapping                             

d) data dadding


a

A process of searching trash cans to find credit card or bank account numbers for illegitimate use is called…….
a) scavenging                     
b) trap door
c) data diddling   
d) zapping


a