Which of the following statements explains the dumpster diving hacking technique?
Which of the following is an example of a social engineering attack?
Which of the following is used over the Internet for better security?
Which of the following programs is used in Linux to modify boot settings?
An Anti-Virus software is used to prevent, detect, and remove malware from a system, including computer viruses, worms, and Trojan horses. Which of the following companies are the providers of Anti-virus softwares?
Each correct answer represents a complete solution. Choose all that apply.
Submit Cancel