Correct Answer
verified
Multiple Choice
A) Smart card
B) Token
C) Biometrics
D) Content filtering
Correct Answer
verified
Multiple Choice
A) A form of social engineering in which one individual lies to obtain confidential data about another individual.
B) A hacker looking through your trash to find personal information.
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing
Correct Answer
verified
Multiple Choice
A) The traditional security process that requires a user name and password.
B) A process that requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) .
C) A process that requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) .
D) The identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting.
Correct Answer
verified
Multiple Choice
A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Single-factor authentication
B) Two-factor authentication
C) Multi-factor authentication
D) Biometrics
Correct Answer
verified
Multiple Choice
A) An Insider
B) Dumpster diving
C) Social engineering
D) Phishing
Correct Answer
verified
Multiple Choice
A) Firewall
B) Certificate authority
C) Online certificate
D) Digital certificate
Correct Answer
verified
Showing 101 - 113 of 113
Related Exams