A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Prevention and resistance
B) Detection and authorizing
C) Detection and response
D) Authentication and authorization
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Technology first, customers second.
B) Technology first, people second.
C) Innovation first, technology second.
D) People first, technology second.
Correct Answer
verified
Multiple Choice
A) It is considered illegal.
B) It is viewed as an invasion of privacy.
C) It can be costly and intrusive.
D) It requires constant monitoring and upgrading.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) The traditional security process that requires a user name and password.
B) A process that requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) .
C) A process that requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) .
D) The identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting.
Correct Answer
verified
Multiple Choice
A) Pharming
B) Worm holes
C) Phishing
D) Insider hacking
Correct Answer
verified
Multiple Choice
A) Single-factor authentication
B) Two-factor authentication
C) Multi-factor authentication
D) Biometrics
Correct Answer
verified
Multiple Choice
A) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.
Correct Answer
verified
Multiple Choice
A) Digital code
B) Digital sign
C) Digital certificate
D) Digital card
Correct Answer
verified
Multiple Choice
A) Identification instruments
B) A form of digital cash
C) A data storage device
D) All of these
Correct Answer
verified
Multiple Choice
A) Zombie
B) Zombie farm
C) Pharming attack
D) Pharming
Correct Answer
verified
Multiple Choice
A) A rerouting of requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.
Correct Answer
verified
Multiple Choice
A) Between a personal computer and the server.
B) Between a personal computer and a printer.
C) Between the server and the content filtering software.
D) Between the server and the Internet.
Correct Answer
verified
Multiple Choice
A) Switch the order of characters.
B) Replace characters with other characters.
C) Insert or remove characters.
D) All of these.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Striker bunny
B) Dumpster diving
C) Trash retrieval
D) Approved consent
Correct Answer
verified
Showing 61 - 80 of 113
Related Exams