A) Data encryption
B) Database administration
C) Data authentication
D) Database normalization
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
Multiple Choice
A) protocol used to secure communication over the internet
B) safety procedure that allows a trusted party to have a copy of the encryption key
C) device that prevents unauthorized network access
D) encryption algorithm that uses both public and private keys
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Botnets
B) Hot sites
C) Honeypots
D) Web beacons
Correct Answer
verified
Multiple Choice
A) Firewalls
B) Technical safeguards
C) Human safeguards
D) Payloads
Correct Answer
verified
Multiple Choice
A) sending valuable data only via email or IM
B) using single password for all the sites
C) removing high-value assets from computers
D) storing browsing history, temporary files, and cookies
Correct Answer
verified
Multiple Choice
A) denial-of-service
B) sniffing
C) brute force
D) phishing
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Hacking
B) Usurping
C) Sniffing
D) Pretexting
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Spoofing
B) Phishing
C) Sniffing
D) Pretexting
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Essay
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Showing 1 - 20 of 123
Related Exams