COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
You are unable to log on to your e-mail account. You realize that someone has changed the password without your knowledge. Which one of the following terms describes this activity?
A
Online predating
B
Theft
C
Internet scam
D
Spyware
Explanation: 

Detailed explanation-1: -Using passwords that can’t be easily guessed, and protecting your passwords by not sharing them or writing them down can help to prevent this. Passwords should be at least 8 characters in length and use a mixture of upper and lower case letters, numbers, and symbols.

Detailed explanation-2: -CISO: Security is the primary concern of the chief information security officer, the CISO. It is their responsibility to set the organization’s security strategy, establish the policies that will uphold the strategy, and ensure that response plans are in place and tested.

Detailed explanation-3: -Requiring longer passwords. Do not use personal details. Use different passwords for different accounts. More items

Detailed explanation-4: -Phishing. Phishing is when a hacker posing as a trustworthy party sends you a fraudulent email, hoping you will reveal your personal information voluntarily. Man-in-the-Middle Attack. Brute Force Attack. Dictionary Attack. Credential Stuffing. Keyloggers.

There is 1 question to complete.