Correct Answer
verified
Multiple Choice
A) Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
B) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
C) Small electronic devices that change user passwords automatically
D) A method for confirming user's identities
Correct Answer
verified
Multiple Choice
A) Smart card
B) Fingerprint authentication
C) User ID
D) None of the above
Correct Answer
verified
Multiple Choice
A) Hactivist
B) Social engineering
C) Insiders
D) Virus
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Switch the order of characters
B) Replace characters with other characters
C) Use a mathematical formula to convert the information into some sort of code
D) All of the above
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
Correct Answer
verified
Multiple Choice
A) Authentication and authorization
B) Prevention and resistance
C) Detection and response
D) Detection and resistance
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Occurs when an organization uses software that filters content to prevent the transmission of unauthorized information
B) Scrambles information into an alternative form that requires a key or password to decrypt the information
C) Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
D) A form of unsolicited email
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Showing 41 - 60 of 80
Related Exams