Get premium membership and access questions with answers, video lessons as well as revision papers.
This is a cyber attack intended to redirect a website's traffic to another, fake site. Pharming can be conducted either by changing the hosts file on a victim's computer or by exploitation of a vulnerability in DNS server software.
Kavungya answered the question on May 17, 2019 at 09:08
- What is Phishing?(Solved)
What is Phishing?
Date posted: May 17, 2019. Answers (1)
- Define electronic spamming.(Solved)
Define electronic spamming.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting scanning attacks.(Solved)
Describe the ways of detecting scanning attacks.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Excess Privileges.(Solved)
Describe the ways of detecting Excess Privileges.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Data Diddling.(Solved)
Describe the ways of detecting Data Diddling.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Trojan Horses, Viruses, Worms, Salamis, and Logic Bombs.(Solved)
Describe the ways of detecting Trojan Horses, Viruses, Worms, Salamis, and Logic Bombs.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Timing Attacks.(Solved)
Describe the ways of detecting Timing Attacks.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Trap Doors.(Solved)
Describe the ways of detecting Trap Doors.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Software Piracy.(Solved)
Describe the ways of detecting Software Piracy.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Masquerading.(Solved)
Describe the ways of detecting Masquerading.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Wiretapping and Eavesdropping.(Solved)
Describe the ways of detecting Wiretapping and Eavesdropping.
Date posted: May 17, 2019. Answers (1)
- Describe Dumpster Diving.(Solved)
Describe Dumpster Diving.
Date posted: May 17, 2019. Answers (1)
- Explain the measures to fight unethical use of ICT.(Solved)
Explain the measures to fight unethical use of ICT.
Date posted: May 17, 2019. Answers (1)
- Describe the data protection act.(Solved)
Describe the data protection act.
Date posted: May 17, 2019. Answers (1)
- State the sources of ICT legislation.(Solved)
State the sources of ICT legislation.
Date posted: May 17, 2019. Answers (1)
- Outline the types of workplace conflicts.(Solved)
Outline the types of workplace conflicts.
Date posted: May 17, 2019. Answers (1)
- Give the effects of conflicts in organizations.(Solved)
Give the effects of conflicts in organizations.
Date posted: May 17, 2019. Answers (1)
- State and explain the methods of dealing with conflicts.(Solved)
State and explain the methods of dealing with conflicts.
Date posted: May 17, 2019. Answers (1)
- List the techniques of reducing conflicts.(Solved)
List the techniques of reducing conflicts.
Date posted: May 17, 2019. Answers (1)
- Explain the techniques of stimulating conflicts.(Solved)
Explain the techniques of stimulating conflicts.
Date posted: May 17, 2019. Answers (1)