Correct Answer
verified
Multiple Choice
A) Key logger
B) Hardware key logger
C) Cookie
D) All of these choices
Correct Answer
verified
Multiple Choice
A) Spyware
B) Spam
C) Adware
D) None of these choices
Correct Answer
verified
Multiple Choice
A) The traditional security process,which requires a username and password
B) Requires the user to provide two means of authentication,what the user knows (password) and what the user has (security token)
C) Requires more than two means of authentication such as what the user knows (password) ,what the user has (security token) ,and what the user is (biometric verification)
D) The identification of a user based on physical characteristic such as a fingerprint,iris,face,voice or handwriting
Correct Answer
verified
Multiple Choice
A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Opt out
B) Opt in
C) BYOD
D) Nonrepudiation
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Information management
B) Information compliance
C) Information secrecy
D) Information ethics
Correct Answer
verified
Multiple Choice
A) Sniffer
B) Spyware
C) Spoofware
D) Ransomware
Correct Answer
verified
Multiple Choice
A) Confidentiality
B) Digital information
C) Privacy policies
D) Information ethics
Correct Answer
verified
Multiple Choice
A) legal & confidential
B) legal & ethical
C) legal & technical
D) confidential & open
Correct Answer
verified
Multiple Choice
A) Insiders to hack into the college system
B) Dumpster diving to find usernames and passwords
C) Viruses and worms to spread through the college system
D) All of these choices
Correct Answer
verified
Multiple Choice
A) Opt out
B) Opt in
C) BYOD
D) Nonrepudiation
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Private key encryption
B) Policy key encryption
C) Public key encryption
D) Protective key code
This is the definition of a PKE.
Correct Answer
verified
Multiple Choice
A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-spam policy
Correct Answer
verified
Showing 281 - 300 of 333
Related Exams