A) digital certificate
B) encryption
C) decrypt
D) cryptography
Correct Answer
verified
Multiple Choice
A) firewall
B) certificate authority
C) online certificate
D) digital content certificate
Correct Answer
verified
Multiple Choice
A) tracking people's activities by such measures as number of keystrokes
B) tracking people's activities by such measures as error rate
C) tracking people's activities by such measures as number of transactions processed
D) All of these are correct.
Correct Answer
verified
Multiple Choice
A) anti-spam system
B) information intelligence system
C) workplace MIS monitoring
D) company technology monitoring
Correct Answer
verified
Multiple Choice
A) pharming
B) authentication
C) authorization
D) programming
Correct Answer
verified
Multiple Choice
A) backdoor programs
B) drive-by hacking
C) polymorphic viruses and worms
D) hacker
Correct Answer
verified
Multiple Choice
A) the traditional security process, which requires a user name and password
B) requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)
C) requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification)
D) the identification of a user based on a physical characteristic such as a fingerprint, iris, face, voice, or handwriting
Correct Answer
verified
Multiple Choice
A) zombie
B) zombie farm
C) pharming attack
D) time bomb
Correct Answer
verified
Multiple Choice
A) malicious code
B) hoaxes
C) spoofing
D) sniffer
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) information management
B) information compliance
C) information governance
D) information secrecy
Correct Answer
verified
Multiple Choice
A) a form of malicious software that infects your computer and asks for money
B) a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys
C) software that allows Internet advertisers to display advertisements without the consent of the computer user
D) a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
Correct Answer
verified
Multiple Choice
A) between a personal computer and the server
B) between a personal computer and a printer
C) between the server and the content filtering software
D) between the server and the Internet
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) key logger software
B) spyware
C) cookie
D) adware
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) spyware
B) hacker
C) drive-by hacking
D) adware
Correct Answer
verified
True/False
Correct Answer
verified
Showing 241 - 260 of 331
Related Exams