Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) by infecting Web search bots with malware
B) by using Web search bots to infect other computers
C) by causing other people's computers to become "zombie" PCs following a master computer
D) by infecting corporate servers with "zombie" Trojan horses that allow undetected access through a back door
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) phishing
B) sniffer
C) pharming
D) encryption
Correct Answer
verified
Multiple Choice
A) customers.employees,and competitors
B) competitors.employees,and business partners
C) customers.competitors and business partners
D) customers.employees,and business partners
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) spoofing
B) keyloggers
C) a Trojan horse
D) worms
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) defragmented
B) ambient
C) forensic
D) recovery
Correct Answer
verified
Multiple Choice
A) tapping;sniffing;message alteration;radiation.
B) hacking;vandalism;denial of service attacks.
C) theft,copying,alteration of data;hardware or software failure.
D) unauthorized access;errors;spyware.
Correct Answer
verified
Multiple Choice
A) voice-mail.
B) spreadsheets.
C) instant messages.
D) e-mail.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) setting up bogus Wi-Fi hot spots.
B) setting up fake Web sites to ask users for confidential information.
C) pretending to be a legitimate business's representative in order to garner information about a security system.
D) using e-mails for threats or harassment.
Correct Answer
verified
True/False
Correct Answer
verified
Showing 121 - 140 of 202
Related Exams