An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as___________
A. | Masquerade Attack |
B. | Replay Attack |
C. | Passive Attack |
D. | Denial of Service Attack |
Option: B Explanation : Click on Discuss to view users comments. |
Consider the following two statements :
(A) Business intelligence and Data warehousing is used for forecasting and Data mining.
(B) Business intelligence and Data warehousing is used for analysis of large volumes of sales data.
Which one of the following options is correct ?
A. | (A) is true, (B) is false. |
B. | Both (A) and (B) are true. |
C. | (A) is false, (B) is true. |
D. | Both (A) and (B) are false. |
Option: B Explanation : Click on Discuss to view users comments. |
A. | decreasing instruction latency |
B. | eliminating data hazards |
C. | exploiting instruction level parallelism |
D. | decreasing the cache miss rate |
Option: C Explanation : Click on Discuss to view users comments. |
Consider the following two statements :
(A) Data scrubling is a process to upgrade the quality of data, before it is moved into Data warehouse.
(B) Data scrubling is a process of rejecting data from data warehouse to create indexes.
Which one of the following options is correct ?
A. | (A) is true, (B) is false. |
B. | (A) is false, (B) is true. |
C. | Both (A) and (B) are false. |
D. | Both (A) and (B) are true. |
Option: A Explanation : Click on Discuss to view users comments. |
A. | Both (A) and (B) are false. |
B. | Both (A) and (B) are true. |
C. | (A) is true, (B) is false. |
D. | (A) is false, (B) is true. |
Option: B Explanation : Click on Discuss to view users comments. |