A) Symmetric encryption
B) Business continuity planning
C) An intrusion detection system
D) Terminal resource security
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) hand geometry
B) iris analysis
C) voice recognition
D) social engineering
Correct Answer
verified
Multiple Choice
A) validity
B) confidentiality
C) integrity
D) availability
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) symmetric
B) asymmetric
C) synchronous
D) asynchronous
Correct Answer
verified
Multiple Choice
A) It occurs when an illegitimate program poses as a legitimate one.
B) It occurs when a comprehensive security plan is being developed.
C) It occurs when a word is converted into a digital pattern.
D) It occurs when a firewall rejects the incoming data packets.
Correct Answer
verified
Multiple Choice
A) Electronic trackers
B) Passwords
C) Firewalls
D) Signature analysis
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) provide level 1 security
B) restrict access controls to unauthorized personnel
C) provide information on security incidents
D) create backdoors to bypass security protocols
Correct Answer
verified
Multiple Choice
A) virus
B) mirror disk
C) cable shield
D) worm
Correct Answer
verified
Multiple Choice
A) firewall
B) rootkit
C) intrusion detection system
D) electronic tracker
Correct Answer
verified
Multiple Choice
A) Sabotage
B) Dumpster
C) Libel
D) Keystroke logging
Correct Answer
verified
Multiple Choice
A) They are more secure and flexible.
B) They control data traffic by configuring a router.
C) They act as an intermediary between two systems.
D) They can be used as a server to scan for malware and viruses.
Correct Answer
verified
Multiple Choice
A) public key infrastructure
B) asymmetric encryption
C) symmetric encryption
D) private key infrastructure
Correct Answer
verified
Multiple Choice
A) validity
B) confidentiality
C) integrity
D) availability
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Trojan programs
B) worms
C) logic bombs
D) backdoors
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
Showing 21 - 40 of 108
Related Exams