A) hacker
B) phisher
C) safeguard
D) sniffer
Correct Answer
verified
Multiple Choice
A) writing software program codes
B) using systems to perform job tasks
C) creating back up of system databases
D) knowing whom to contact when a security breach occurs
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Malware
B) Cookie
C) Firewall
D) Spam
Correct Answer
verified
Multiple Choice
A) It uses asymmetric encryption exclusively.
B) It is used to send sensitive data such as credit card numbers.
C) It uses one set of encryption keys for multiple sessions.
D) It is a stronger version of https.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) ATM card
B) smart card
C) cookie
D) key escrow
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) System administrators should retain user accounts after an employee has been terminated.
B) All employees must be provided with uniform, general training on security regardless of the sensitivity of their positions.
C) Documenting position sensitivity enables security personnel to prioritize their activities based on possible risk.
D) Holding public users of Web sites accountable for security violations is easy and inexpensive.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Employees' dissatisfaction
B) Natural disasters
C) Hackers
D) Competitors
Correct Answer
verified
Multiple Choice
A) key
B) honeypot
C) cookie
D) cache
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) the Privacy Act of 1974
B) the Sarbanes-Oxley Act
C) the HIPAA of 1996
D) the Gramm-Leach-Bliley Act
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) worm
B) sniffer
C) Trojan horse
D) phisher
Correct Answer
verified
Showing 41 - 60 of 123
Related Exams