A) Firewall
B) Certificate authority
C) Online certificate
D) Digital certificate
Correct Answer
verified
Multiple Choice
A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens.
D) An antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Something the user knows,such as a user ID and password
B) Something the user has,such as a smart card or token
C) Something that is part of the user,such as a fingerprint or voice signature
D) All of the above
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) What is the productivity cost associated with each hour of downtime?
B) How many transactions can the company afford to lose without significantly harming business?
C) All of the above
D) None of the above
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Sniffer
B) Spyware
C) Spoofware
D) Splog
Correct Answer
verified
Multiple Choice
A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb
Correct Answer
verified
Multiple Choice
A) Safety
B) Ethical standard
C) Privacy
D) Confidentiality
Correct Answer
verified
Multiple Choice
A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens
D) An antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.
Correct Answer
verified
Multiple Choice
A) White-hat hacker
B) Black-hat hacker
C) Cyberterrorists
D) Script bunnies
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing
Correct Answer
verified
True/False
Correct Answer
verified
Showing 61 - 80 of 342
Related Exams