Cyber fraud management exam recollected questions on 17.11.2018
The regulator of uav ,
Netra developed by,
Script kiddies,
Ethical hacking,
Blue hat hacking,
Nigeria 419,
Social engineering,
When a NRI contacted u by phone to transfer 500000 lakh rupee to another account in another branch.what action will be taken by you as a Branch manager.
.org,.com are Tld or Sld,
Cyber crime definition,
Cyber smearing,
Masquerading attack,
Email spoofing,
In a software application at end of page we use to see "I agree with term and conditions".what do you mean by that.
A.p case vs Tcs case,
Eucp started in which year,
Steps involved in online transfer processing.
Where scada is used.
Anonymous definition,
Tail gating,
Tress passing,
Harrasing a lady over mail comes under which crime,
Cyber warfare,
Definition of Durability,
Odd man out of the given below which is not an app
1.ola 2.google store.3.black berry.4.apple
Locard principle,
Malicious code writers,
By rama
Cyber crime definition
3 factors induce to commit fraud
Internet of things
Wank worm first hacktivist attack
Stuxnet
Script kiddies
Spoofing
CcTLD
Ransomware
SCADA
Vishing
Authorisation authentication difference
BYOD
authentication tech for e mail
Digital signature
Internet addiction disorder
CAPTCHA
blue hat hacker
2D bar coding known as matrix code
DML
prevention control
Detection control
Digital footprints
Brute force attack
Payment wallets
SWIFT
prepaid cards
Shoulder surfing
PCIDSS
TCS vs state of AP case
IPC forgery of electronic records
3 domain servers of security initiative
Compulsive disorders
Stylometry
Jilani working group
FSDC
CBI Interpol
The regulator of uav ,
Netra developed by,
Script kiddies,
Ethical hacking,
Blue hat hacking,
Nigeria 419,
Social engineering,
When a NRI contacted u by phone to transfer 500000 lakh rupee to another account in another branch.what action will be taken by you as a Branch manager.
.org,.com are Tld or Sld,
Cyber crime definition,
Cyber smearing,
Masquerading attack,
Email spoofing,
In a software application at end of page we use to see "I agree with term and conditions".what do you mean by that.
A.p case vs Tcs case,
Eucp started in which year,
Steps involved in online transfer processing.
Where scada is used.
Anonymous definition,
Tail gating,
Tress passing,
Harrasing a lady over mail comes under which crime,
Cyber warfare,
Definition of Durability,
Odd man out of the given below which is not an app
1.ola 2.google store.3.black berry.4.apple
Locard principle,
Malicious code writers,
By rama
Cyber crime definition
3 factors induce to commit fraud
Internet of things
Wank worm first hacktivist attack
Stuxnet
Script kiddies
Spoofing
CcTLD
Ransomware
SCADA
Vishing
Authorisation authentication difference
BYOD
authentication tech for e mail
Digital signature
Internet addiction disorder
CAPTCHA
blue hat hacker
2D bar coding known as matrix code
DML
prevention control
Detection control
Digital footprints
Brute force attack
Payment wallets
SWIFT
prepaid cards
Shoulder surfing
PCIDSS
TCS vs state of AP case
IPC forgery of electronic records
3 domain servers of security initiative
Compulsive disorders
Stylometry
Jilani working group
FSDC
- to combat computer related crimes, CBI has following specialized structure
CBI Interpol
No comments:
Post a Comment