A) is a device the size of a credit card that contains access permission data.
B) is a type of smart card.
C) is a device that displays passcodes.
D) is an electronic marker attached to a digital authorization file.
E) compares a person's unique characteristics against a stored profile of these characteristics to determine any differences between these characteristics and the stored profile.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) high-capacity storage.
B) a multi-tier server network.
C) fault-tolerant computer systems.
D) dedicated phone lines.
E) deep packet inspection.
Correct Answer
verified
Multiple Choice
A) the Netherlands.
B) the United Kingdom.
C) the United States.
D) Germany.
E) Mexico.
Correct Answer
verified
Multiple Choice
A) uses third-party CAs to validate a user's identity.
B) uses digital signatures to validate a user's identity.
C) uses tokens to validate a user's identity.
D) is used primarily by individuals for personal correspondence.
E) uses deep packet inspection to validate a user's identity.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) security policy.
B) AUP.
C) risk assessment.
D) business impact analysis.
E) What-if analysis.
Correct Answer
verified
Multiple Choice
A) Business continuity planning
B) Security policies
C) Disaster recovery planning
D) An AUP
E) An information systems audit
Correct Answer
verified
Multiple Choice
A) Identity theft
B) Spoofing
C) Social engineering
D) Evil twins
E) Cybervandalism
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) DDoS
B) DoS
C) SQL injection
D) phishing
E) ransomware
Correct Answer
verified
Multiple Choice
A) TLS
B) AUP
C) VPN
D) WPA2
E) S-HTTP
Correct Answer
verified
Multiple Choice
A) Trojan Horse
B) SQL injection attack
C) Sniffer
D) Evil twin
E) Ransomware
Correct Answer
verified
Multiple Choice
A) SSL
B) Symmetric key encryption
C) Public key encryption
D) Private key encryption
E) TLS
Correct Answer
verified
Multiple Choice
A) presenting collected evidence in a court of law.
B) securely storing recovered electronic data.
C) collecting physical evidence on the computer.
D) finding significant information in a large volume of electronic data.
E) recovering data from computers while preserving evidential integrity.
Correct Answer
verified
Multiple Choice
A) redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.
B) pretending to be a legitimate business's representative in order to garner information about a security system.
C) setting up fake websites to ask users for confidential information.
D) using emails for threats or harassment.
E) malware that displays annoying pop-up messages.
Correct Answer
verified
Multiple Choice
A) enforce a security policy on data exchanged between its network and the Internet.
B) check the accuracy of all transactions between its network and the Internet.
C) create an enterprise system on the Internet.
D) check the content of all incoming and outgoing email messages.
E) authenticate users.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Showing 21 - 40 of 100
Related Exams