题目内容

_______ is the use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.

A. Zombie apocalypse
B. Cyberbullying
C. Trojan horse attack
D. Identity theft

查看答案
更多问题

A(n) _______ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information.

A. viral
B. phishing
C. rogue
D. worm

_______ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver.

A. Scams
B. Zombies
C. Rogues
D. Trojan horses

_______ is the process of coding information to make it unreadable except to those who have a special piece of information known as a key.

A. Encryption
B. Prevention
C. Decryption
D. Restriction

_______ scanning devices use fingerprints and iris scanners to identify individuals.

A. Visual
Biometric
C. Optical
D. Virtual

答案查题题库