A) Trojan Horse
B) worm
C) multi-thread virus
D) blended threat
Correct Answer
verified
Multiple Choice
A) Spoofers
B) Proxy servers
C) Packet sniffers
D) Packet filters
Correct Answer
verified
Multiple Choice
A) attack resistance
B) attack survivability
C) system recovery
D) system survivability
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) smart card
B) fingerprint scanner
C) biometric scanner
D) retina scanner
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) not noticeable until later
B) the slower processing time of legitimate work
C) complete data loss with little chance of recovery
D) a computer crash with or without a blue screen
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) dumpster diving
B) digital recycling
C) dumpster surfing
D) trash surfing
Correct Answer
verified
Multiple Choice
A) snooping
B) packet filtering
C) a proxy server
D) anti-virus software
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) password
B) passphrase
C) token
D) ticket
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) redirection
B) blocking
C) proxy
D) fire
Correct Answer
verified
Multiple Choice
A) Spoofing
B) Phishing
C) Impersonating
D) Acting
Correct Answer
verified
Multiple Choice
A) Trojan horse
B) piggyback entry
C) browsing
D) trap doors
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) it increases the system's overhead
B) it is inconvenient for users
C) it is prohibitive in cost
D) it is often ineffective
Correct Answer
verified
True/False
Correct Answer
verified
Showing 1 - 20 of 40
Related Exams