A) re-securing
B) decryption
C) assessment
D) digitization
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) war driving
B) spitting
C) clickjacking
D) spimming
Correct Answer
verified
Multiple Choice
A) Fill out rebates and warranty forms completely to provide the manufacturer with as much information as possible in case you need to contact them.
B) Clear your history file when you are finished browsing.
C) Preprint your telephone number on your personal checks so businesses can reach you quickly if they determine there is a problem with your purchase.
D) Use shopping club and buying cards when shopping to remain anonymous.
Correct Answer
verified
Multiple Choice
A) CAN-SPAM Act
B) Computer Abuse Amendments Act
C) COPPA
D) Electronic Communication Privacy Act
Correct Answer
verified
Multiple Choice
A) parallel
B) MIDI
C) USB
D) serial
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) hacker
B) script kiddie
C) cyberextortionist
D) cyberterrorist
Correct Answer
verified
Multiple Choice
A) Personal characteristics are unique and cannot be forgotten or misplaced.
B) Biometric devices are an unreliable method of identification and notification.
C) Examples include fingerprint readers and hand geometry systems.
D) Biometric devices translate a personal characteristic into a digital code.
Correct Answer
verified
Matching
Correct Answer
Multiple Choice
A) spoofing
B) phishing
C) veiling
D) costuming
Correct Answer
verified
Multiple Choice
A) malware
B) cybersoft
C) evilapp
D) viralware
Correct Answer
verified
Multiple Choice
A) PIN
B) badge
C) smart card
D) key
Correct Answer
verified
Multiple Choice
A) comware
B) postware
C) spyware
D) billware
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) software deployment
B) software decryption
C) app installation
D) product activation
Correct Answer
verified
Multiple Choice
A) controlled key encryption
B) virtual key encryption
C) asymmetric key encryption
D) secure key encryption
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) substitution
B) transposition
C) expansion
D) compaction
Correct Answer
verified
Showing 61 - 80 of 181
Related Exams