A) worm
B) rootkit
C) trojan horse
D) virus
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) number
B) name
C) network
D) note
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Law enforcement officials cannot access email messages stored on the cloud without informing the user first.
B) The company storing the data must protect against data loss due to physical disasters.
C) When transferring data over a network to the cloud, the data should be encrypted and authenticated.
D) Cloud storage companies have increased their privacy and security features in recent years.
Correct Answer
verified
Multiple Choice
A) hacker
B) cracker
C) script kiddie
D) cyberextortionist
Correct Answer
verified
Multiple Choice
A) eye
B) fingerprints
C) signature
D) face
Correct Answer
verified
Multiple Choice
A) It likely is spoofed.
B) It is secure.
C) It provides security services and information.
D) It contains encrypted data.
Correct Answer
verified
Multiple Choice
A) Another term for it is two-factor verification.
B) When a system sends an authentication code, it typically does not expire.
C) If you sign in from a device you use frequently, you can elect to bypass two-step verification.
D) ATMs usually require a two-step verification.
Correct Answer
verified
Multiple Choice
A) criminal records
B) students' educational records
C) financial transactions
D) user names and passwords
Correct Answer
verified
Multiple Choice
A) IP
B) EULA
C) electronic profile
D) code of conduct
Correct Answer
verified
Multiple Choice
A) manipulation
B) engineering
C) hacking
D) misdirection
Correct Answer
verified
Multiple Choice
A) Consolidate servers by using virtualization.
B) Use outside air to cool the data center when possible.
C) Purchase low-efficiency equipment.
D) Use sleep modes and other power management features.
Correct Answer
verified
Multiple Choice
A) A file recovery method that circumvents the computer or mobile device's network.
B) An invisible image on a website that, if accidentally clicked, downloads a virus to the user's computer or mobile device.
C) A hardware device that reinforces security settings on a computer or network.
D) A program or set of instructions that allows user to bypass security controls when accessing a program, computer, or network.
Correct Answer
verified
Multiple Choice
A) Retain the default administrative password.
B) Choose a secure location for your wireless router.
C) Broadcast the SSID.
D) Enable an encryption method such as WPA2.
Correct Answer
verified
Showing 41 - 60 of 86
Related Exams