Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) faulty service resulting from human error
B) distributed denial of service resulting from malicious activity
C) faulty service resulting from malicious activity
D) distributed denial of service resulting from human error
Correct Answer
verified
Multiple Choice
A) malware
B) metadata
C) software
D) widgets
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) authenticates
B) identifies
C) conceals
D) encrypts
Correct Answer
verified
Multiple Choice
A) Passwords
B) Smart cards
C) Biometric authentication
D) Personal identification numbers
Correct Answer
verified
Multiple Choice
A) Spoofing attacks
B) Hacking attacks
C) Phishing attacks
D) DOS attacks
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) hacking
B) phishing
C) pretexting
D) sniffing
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Essay
Correct Answer
verified
View Answer
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) macro viruses
B) Trojan horses
C) worms
D) payloads
Correct Answer
verified
Multiple Choice
A) Both masquerade as useful programs.
B) Both are specifically programmed to spread.
C) Both are installed without the user's permission.
D) Both are used to steal data.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) account administration
B) security monitoring
C) backup
D) data administration
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Application design
B) Backup and recovery
C) Accountability
D) Procedure design
Correct Answer
verified
Multiple Choice
A) an employee who misunderstands operating procedures
B) an employee who accidentally deletes customer records
C) an employee who inadvertently installs an old database on top of the current one
D) an employee who intentionally destroys data or other system components
Correct Answer
verified
Showing 41 - 60 of 80
Related Exams