A) HTML
B) HTML5
C) Adobe Flash
D) Adobe Acrobat
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) worm
B) exploit kit
C) phishing
D) hacktivism
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) China.
B) Russia.
C) Nigeria.
D) North Korea.
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) integrity
B) availability
C) integrity and authenticity
D) availability and integrity
Correct Answer
verified
Multiple Choice
A) poor security.
B) cost to consumers.
C) cost to merchant.
D) social equity.
Correct Answer
verified
Multiple Choice
A) data integrity
B) technology
C) organizational policies
D) laws and industry standards
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity
Correct Answer
verified
Multiple Choice
A) 8
B) 56
C) 256
D) 512
Correct Answer
verified
Essay
Correct Answer
verified
Multiple Choice
A) scareware
B) Trojan horse
C) bot
D) sniffer
Correct Answer
verified
Multiple Choice
A) firewalls
B) proxy servers
C) digital signatures
D) login passwords
Correct Answer
verified
Multiple Choice
A) DES
B) NFC
C) IM
D) text messaging
Correct Answer
verified
Multiple Choice
A) in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message.
B) the Data Encryption Standard is a symmetric key encryption system.
C) symmetric key cryptography is computationally slower.
D) symmetric key cryptography is a key element in digital envelopes.
Correct Answer
verified
Multiple Choice
A) Create a security organization.
B) Develop a security policy.
C) Perform a risk assessment.
D) Perform a security audit.
Correct Answer
verified
Showing 1 - 20 of 85
Related Exams