Correct Answer
verified
View Answer
Multiple Choice
A) personal identification number
B) private Internet notification
C) possessed information number
D) personal information network
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) digital signature
B) digital certificate
C) CA
D) digital security risk
E) firewall
F) botnet
G) zombie
H) clickjacking
I) Digital Millennium Copyright Act (DCMA)
J) DoS attack
K) AUP
L) iris recognition system
M) web filtering software
N) password
O) script kiddie
P) ciphertext
Q) plaintext
R) bot
S) piracy
T) copyright
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) digital signature
B) digital certificate
C) CA
D) digital security risk
E) firewall
F) botnet
G) zombie
H) clickjacking
I) Digital Millennium Copyright Act (DCMA)
J) DoS attack
K) AUP
L) iris recognition system
M) web filtering software
N) password
O) script kiddie
P) ciphertext
Q) plaintext
R) bot
S) piracy
T) copyright
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) manager filtering
B) employee monitoring
C) job spamming
D) employee indexing
Correct Answer
verified
Multiple Choice
A) iris recognition systems
B) digital forensics systems
C) face recognition systems
D) hand geometry systems
Correct Answer
verified
Multiple Choice
A) Personal characteristics are unique and cannot be forgotten or misplaced.
B) Biometric devices are an unreliable method of identification and notification.
C) Examples include fingerprint readers and hand geometry systems.
D) Biometric devices translate a personal characteristic into a digital code.
Correct Answer
verified
Multiple Choice
A) CAPTCHA
B) CERT/CC
C) two-step verification
D) serial authentication
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) digital signature
B) digital certificate
C) CA
D) digital security risk
E) firewall
F) botnet
G) zombie
H) clickjacking
I) Digital Millennium Copyright Act (DCMA)
J) DoS attack
K) AUP
L) iris recognition system
M) web filtering software
N) password
O) script kiddie
P) ciphertext
Q) plaintext
R) bot
S) piracy
T) copyright
Correct Answer
verified
Multiple Choice
A) cyberware
B) conware
C) criminalware
D) crimeware
Correct Answer
verified
Multiple Choice
A) corrupt
B) Caesar
C) administrator
D) kiddie
Correct Answer
verified
Multiple Choice
A) restoring
B) backing up
C) encrypting
D) deciphering
Correct Answer
verified
Showing 41 - 60 of 197
Related Exams