Correct Answer
verified
Multiple Choice
A) Consolidate servers by using virtualization.
B) Use outside air to cool the data center when possible.
C) Purchase low-efficiency equipment.
D) Use sleep modes and other power management features.
Correct Answer
verified
Multiple Choice
A) hacker
B) cracker
C) script kiddie
D) cyberextortionist
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) malicious
B) malignant
C) malevolent
D) malady
Correct Answer
verified
Multiple Choice
A) worm
B) rootkit
C) trojan horse
D) virus
Correct Answer
verified
Multiple Choice
A) manipulation
B) engineering
C) hacking
D) misdirection
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) series
B) algorithm
C) method
D) key
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) ghost
B) vampire
C) zombie
D) spy
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) The acceptable use of technology by employees for personal reasons.
B) The guidelines for using licensed software.
C) A list of IP addresses known to be safe.
D) A user's personal authentication methods.
Correct Answer
verified
Showing 21 - 40 of 86
Related Exams