Correct Answer
verified
Multiple Choice
A) Authentication and authorization,prevention and resistance,prevention and response
B) Authentication and authorization,prevention and response,detection and response
C) Analyzing and authenticating,prevention and repositioning,detection and response
D) Authentication and authorization,prevention and resistance,detection and response
Correct Answer
verified
Multiple Choice
A) Pharming
B) Worm holes
C) Phishing
D) Insider hacking
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Must never upgrade or change vendors
B) Must download a portable button for it to activate
C) Must frequently update it to protect against viruses
D) All of these choices
Correct Answer
verified
Multiple Choice
A) Legal behavior and ethical behavior
B) Illegal behavior and ethical behavior
C) Legal behavior and unethical behavior
D) All of these choices
Correct Answer
verified
Multiple Choice
A) Polymorphic virus
B) Worm
C) Trojan-horse virus
D) Backdoor programs
Correct Answer
verified
Multiple Choice
A) Security and sales
B) Human resources and security
C) Ethics and security
D) Ethics and technology
Correct Answer
verified
Multiple Choice
A) Social media monitoring
B) Social media manager
C) Social media policy
D) Information privacy manager
Correct Answer
verified
Multiple Choice
A) Cyberbulling
B) Information vandalism
C) Cookie
D) BYOD
Correct Answer
verified
Multiple Choice
A) Iris scan
B) Password
C) Fingerprint
D) Handwriting
Correct Answer
verified
Multiple Choice
A) Firewall
B) Certificate authority
C) Online certificate
D) Digital certificate
Correct Answer
verified
Multiple Choice
A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) The theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens
D) An antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Information spy
B) Hacker
C) Spyware
D) Adware
Correct Answer
verified
Multiple Choice
A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Acceptable use policy
B) Email privacy policy
C) Internet use policy
D) All of these choices
Correct Answer
verified
Multiple Choice
A) The traditional security process,which requires a username and password
B) Requires the user to provide two means of authentication,what the user knows (password) and what the user has (security token)
C) Requires more than two means of authentication such as what the user knows (password) ,what the user has (security token) ,and what the user is (biometric verification)
D) The identification of a user based on physical characteristic such as a fingerprint,iris,face,voice or handwriting
Correct Answer
verified
Showing 41 - 60 of 333
Related Exams