Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Corner bolts
B) Identification badges
C) Callback modems
D) Electronic trackers
Correct Answer
verified
Multiple Choice
A) blended threat
B) mirror disk
C) backdoor threat
D) firewall
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Intrusion detection systems
B) Proxy servers
C) Identification badges
D) Virtual private networks
Correct Answer
verified
Multiple Choice
A) Electronic trackers
B) Retinal scanning
C) Callback modems
D) Signature analysis
Correct Answer
verified
Multiple Choice
A) Phishing
B) Keystroke logging
C) Spoofing
D) Pharming
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) It is usually hidden inside a popular program,but it is not capable of replicating itself.
B) It floods a network or server with service requests to prevent legitimate users' access to the system.
C) It is an independent program that can spread itself without attaching itself to a host program.
D) It enables a system designer to bypass the security of a system and sneak back into the system later to access files.
Correct Answer
verified
Multiple Choice
A) Transport Layer Security
B) Terminal Resource Security
C) Transmission Control Security
D) User Datagram Security
Correct Answer
verified
Multiple Choice
A) It involves monitoring and recording keystrokes.
B) It involves sending fraudulent e-mails that seem to come from legitimate sources.
C) It consists of self-propagating program code that is triggered by a specified time or event.
D) It prevents the disclosure of information to anyone who is not authorized to access it.
Correct Answer
verified
Multiple Choice
A) sniffing
B) phishing
C) bombing
D) pharming
Correct Answer
verified
Multiple Choice
A) virus
B) mirror disk
C) cable shield
D) backdoor
Correct Answer
verified
Multiple Choice
A) integrity
B) confidentiality
C) validity
D) availability
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Secure Sockets Layer
B) Transport Layer Security
C) User Datagram Protocol
D) Transmission Control Protocol
Correct Answer
verified
Multiple Choice
A) STOPzilla
B) AndroZip
C) Tumblr
D) Dogpile
Correct Answer
verified
Multiple Choice
A) sniffing
B) screening
C) pharming
D) cybersquatting
Correct Answer
verified
Showing 81 - 100 of 109
Related Exams