cyber security and element set 29

Que.Fixing of security vulnerabilities in a system by additional programs is known as __________ patches.
a. hacking
b. database
c. server
d. security
Que.Known bugs can be solved or removed by __________________ develop by the vendors of the application.
a. removing the application
b. changing the software
c. installing security patches
d. installing database patches
Que.___________________ are some very frequent updates that come for every anti-virus.
a. Patch update
b. Data update
c. Code update
d. Definition update
Que.National Vulnerability Database (NVD) is _________________ repository of data regarding vulnerability standards.
a. U.S. government
b. India government
c. Russian government
d. China Government
Que.CVE is a directory of lists of publicly recognized information security vulnerabilities as well as exposures.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Which of the following is not a type of cyber crime?
a. Data theft
b. Forgery
c. Damage to data and systems
d. Installing antivirus for protection
Que.Cyber-laws are incorporated for punishing all criminals only.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Cyber-crime can be categorized into ________ types.
a. 4
b. 3
c. 2
d. 6
Que.Which of the following is not a type of peer-to-peer cyber-crime?
a. Phishing
b. Injecting Trojans to a target victim
c. MiTM
d. Credit card details leak in deep web
Que.Which of the following is not an example of a computer as weapon cyber-crime?
a. Credit card fraudulent
b. Spying someone using keylogger
c. IPR Violation
d. Pornography