Professional Documents
Culture Documents
Cyber Security Important Questions Chapter 3, 4, 5 RGPV (CS503 (C) )
Cyber Security Important Questions Chapter 3, 4, 5 RGPV (CS503 (C) )
Cyber Security Important Questions Chapter 3, 4, 5 RGPV (CS503 (C) )
Paga
AsSINHENT3
Q O h a t is II Act 2000. AeSCnbe the salN.
eotunes h II Act 2000
Extronc Comnnce
method
>|tentiljcaticoo
educalicor will asSiSE S1esponsible
|Compcnie and cns to neet hesSe
challengs.
A pen Son should neven seno his credit
CCMd nuben i debit cad nunbe
anysitethat S not Seced
guad agsinst tuds
everotLon3
>USe an emo checken
>Aucoid punchasiag cmal lists
1me yaun Campoigns iook egitimate
Use tbe double mptin method to colec emas
oddresses
|> Maintgn CConsiStent sending schedule
Poteot Lau
A patent is a fmmoh
erchswe ighrs
00_iovegtol
tonteaya soveneigo stote to
n their imited penicd o
tnne in
assigree
erchane n tre oublic discioSne
t
pateot is o gal mcon spolhicn
rante d a Qimited time
couny
to the cOonee huentioO Heely
to USe patented
tne
Dolo
Pago
>Ettencap
anllgsis St gt tne Capabith
an sSS SS H CODnectcno.
AssiCaN HENT - H
Rega-dng
seccon 59, uhich incaporoten doanmntg
tne wods " Contents a) documents"
evidence"
have been Subat tojed
the
Funthen secthiun 79D a
sectitn 45 o ne indionEude
Section 45 , tne IEA prauLde
Aet
Cpunin erpents
te gtotus o
plechooic Ghelmds as
electroniC
II Act 2000?
eudence belne ajn.
cectronic secacds
Beoxe TT ACE 2000
euicdence
spcalies n
ngian Eidence ac sectian 65 euLdence i
Ladmsihlit secandamy
Eechioo 650 spechs
the contears t
mce duzeapag
eletconiC1eCords uhich noue hee0.
laidde
pace du
inlo must toke
tne
thot peSGo
Dete
Page
L3)Jnot stared
ed ino has bee
electCOOic device
duning day
geneoo pensn
rule
Admi9si ble - most basC Fete& meoSe
evidence uaidity ond in portonce the evideoce
must e pressuned ond gathenod in Such a coay
tnat tcan he used
3) Obtencone
Jimestomps electrOnic agreements
whe the
with je time stamp indiCating
AgreemeGt uos made
into an agreement
Purpose
IneURL
D0TS Py
Visite
Creotion 9otenot
Qnotne op ystm
Dete
Han-in-he middlephishing
etec tnan monyothe ms
8n tnese ockens pohoo
ish ing
Data
Paga.
message cipeies to
to tne aHackens
lollo0 a hypnlink
Oithout trem
Lmecying that they have been dumoed
Otne disk
pragram ylla the Capucty
Phase:he
Origaenig Phase Vius is acHJared
vir
pelnm tne
w0S intented Asuaíth TNe dorGAt
phase
he
-Stealth Vicus
Palyma phic icus
Panosthc WifuS
Hencyesidcat vicas
Bcoot Setar Virus
-Resident
4omdisk
the andpcagcontha Eram
eveny ponhat
Vicus. Virus
he
sprenà
detaches
MeplicotesroditOnoIhe
yirus
cantaingdisk
wben a uiruses
mo}
reSideo
a odqes
whentne
CrcCAte
boGted is
te
mimuy
main in
Sysfem
tne CLeutable Pogs Dale
Gecind
boot
paan