_______ is concerned with protecting software and data from unauthorized tampering or damage.
A. Cloud computing
B. Decryption
C. Phishing
Data security
查看答案
As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the _______.
A. firewall
B. disaster recovery plan
C. encryption device
D. loss prevention team
A(n) _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
A. Trojan horse
B. dictionary
C. web bug
D. denial of service
_______ is representing some other person’s work and ideas as your own without giving credit to the original source.
A. Blogging
B. Phishing
C. Plagiarism
D. Key logging
Which part of an information system consists of the rules or guidelines for people to follow?
A. People
B. Procedures
C. Internet
Data