Correct Answer
verified
View Answer
Multiple Choice
A) key escrow
B) white hat
C) key encryption
D) biometric authentication
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Spoofing attacks
B) Hacking attacks
C) Phishing attacks
D) DOS attacks
Correct Answer
verified
Multiple Choice
A) Both masquerade as useful programs.
B) Both are specifically programmed to spread.
C) Both are installed without user's permission.
D) Both are used to steal data.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) usurp
B) spoof
C) hack
D) flood
Correct Answer
verified
Multiple Choice
A) Application design
B) Backup and recovery
C) Accountability
D) Procedure design
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Spoofing
B) Hacking
C) Pretexting
D) Sniffing
Correct Answer
verified
Multiple Choice
A) It is a type of data safeguard.
B) It enables security personnel to prioritize their activities in accordance with the possible risk and loss.
C) It is documented only for high-sensitivity positions.
D) It applies to new employees only.
Correct Answer
verified
Multiple Choice
A) Data safeguards
B) Patches
C) Antivirus scans
D) Malware definitions
Correct Answer
verified
Multiple Choice
A) allows help-desk representatives to create new passwords for users
B) reduces the strength of the security system
C) protects the anonymity of a user
D) helps authenticate a user
Correct Answer
verified
Multiple Choice
A) hacking
B) phishing
C) pretexting
D) sniffing
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Passwords
B) Smart cards
C) Biometric authentication
D) Personal identification numbers
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) Perimeter
B) Internal
C) Packet-filtering
D) Malware
Correct Answer
verified
True/False
Correct Answer
verified
Showing 41 - 60 of 80
Related Exams