Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Which of the following is not a cybercrime?
Home
Cyber Security
Which of the following is not a cybercrime?
0
votes
asked
Feb 19, 2022
in
Cyber Security
by
SakshiSharma
Which of the following is not a cybercrime?
1)Denial of Service
2)Man in the Middle
3)Malware
4)AES
cyber-crime
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Feb 19, 2022
by
SakshiSharma
4)AES is not a cybercrime
Related questions
0
votes
Q: Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______.
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-crime
0
votes
Q: Which of the following is not a type of scanning?
asked
Feb 19, 2022
in
Cyber Security
by
SakshiSharma
scanning
0
votes
Q: In the CIA Triad, which one of the following is not involved?
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
cia
0
votes
Q: Which type of the following malware does not replicate or clone them self’s through infection?
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
malware
0
votes
Q: Which of the following is not an advantage of cyber security?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
0
votes
Q: Read the following statement carefully and find out whether it is correct about the hacking or not?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
hacking
cyber-security
+1
vote
Q: As an email client, we should not use caution when opening emails and can download any
asked
Oct 23, 2021
in
Cyber Security
by
john ganales
download-attachment
0
votes
Q: Threats can exploit assets if assets are not vulnerable.
asked
Oct 23, 2021
in
Cyber Security
by
john ganales
cyber-threats
0
votes
Q: Which of the following is a type of independent malicious program that never required any host program?
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
malicious-program
+1
vote
Q: Which of the following type of text is transformed with the help of a cipher algorithm?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cipher-algorithm
...