题目内容

_______ is concerned with protecting software and data from unauthorized tampering or damage.

A. Cloud computing
B. Decryption
C. Phishing
Data security

查看答案
更多问题

As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the _______.

A. firewall
B. disaster recovery plan
C. encryption device
D. loss prevention team

A(n) _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

A. Trojan horse
B. dictionary
C. web bug
D. denial of service

_______ is representing some other person’s work and ideas as your own without giving credit to the original source.

A. Blogging
B. Phishing
C. Plagiarism
D. Key logging

Which part of an information system consists of the rules or guidelines for people to follow?

A. People
B. Procedures
C. Internet
Data

答案查题题库