When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called
All of the following are examples of real security and privacy threats except:
1 Crore+ students have signed up on EduRev. Have you? Download the App |
Trojan horses are very similar to virus in the matter that they are computer programs that replicate copies of themselves.
____________ monitors user activity on internet and transmit that information in the background to someone else.
Firewall is a type of ____________.
Unsolicited commercial email is knownas ____________.
15 videos|19 docs|6 tests
|
15 videos|19 docs|6 tests
|