A) control
B) firewall
C) check
D) lock
Correct Answer
verified
Multiple Choice
A) devastating
B) enterprise
C) organized
D) distributed
Correct Answer
verified
Multiple Choice
A) A log of financial transactions.
B) A file that records access attempts.
C) A list of passwords and user names on a network.
D) A record of hacking attempts.
Correct Answer
verified
Multiple Choice
A) Generates a list of user names and passwords for network administrators.
B) Creates CAPTCHA images.
C) Analyzes typing patterns to authenticate a user.
D) Creates software registration numbers.
Correct Answer
verified
Multiple Choice
A) surge protector
B) UPS
C) cables and locks
D) duplicate components
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) vault
B) binder
C) manager
D) collection
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) hacker
B) cracker
C) script kiddie
D) cyberextortionist
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A file recovery method that circumvents the computer or mobile device's network.
B) An invisible image on a website that, if accidentally clicked, downloads a virus to the user's computer or mobile device.
C) A hardware device that reinforces security settings on a computer or network.
D) A program or set of instructions that allows user to bypass security controls when accessing a program, computer, or network.
Correct Answer
verified
Multiple Choice
A) password
B) algorithm
C) code
D) key
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Another term for it is two-factor verification.
B) When a system sends an authentication code, it typically does not expire.
C) If you sign in from a device you use frequently, you can elect to bypass two-step verification.
D) ATMs usually require a two-step verification.
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) IP
B) EULA
C) electronic profile
D) code of conduct
Correct Answer
verified
Showing 61 - 80 of 86
Related Exams