A) dumpster diving
B) digital recycling
C) dumpster surfing
D) trash surfing
Correct Answer
verified
Multiple Choice
A) unintentional attack
B) malicious attack
C) denial-of-service attack
D) trap door attack
Correct Answer
verified
Multiple Choice
A) LAN with Internet
B) LAN without Internet
C) Single computer without e-mail or Internet
D) LAN with firewall
Correct Answer
verified
Multiple Choice
A) diagnostic
B) preventive
C) reactive
D) firewall
Correct Answer
verified
Multiple Choice
A) incremental
B) layered
C) phased
D) recovery-based
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) it increases the system's overhead
B) it is inconvenient for users
C) it is prohibitive in cost
D) it is often ineffective
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Spoofing
B) Phishing
C) Impersonating
D) Acting
Correct Answer
verified
Multiple Choice
A) Spoofers
B) Proxy servers
C) Packet sniffers
D) Packet filters
Correct Answer
verified
Multiple Choice
A) Trojan Horse
B) worm
C) multi-thread virus
D) blended threat
Correct Answer
verified
Multiple Choice
A) .008788 seconds
B) 4.5 seconds
C) 2.5 hours
D) 58 hours
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) password
B) passphrase
C) token
D) ticket
Correct Answer
verified
Multiple Choice
A) snooping
B) packet filtering
C) a proxy server
D) anti-virus software
Correct Answer
verified
Multiple Choice
A) authentication
B) integrity checking
C) data replication
D) encryption
Correct Answer
verified
Showing 21 - 40 of 40
Related Exams