题目内容

A(n) _________ is a software package that attempts to identify and eliminate viruses and worms.

A. anti-malware system
B. DMZ
C. ERP
D. firewall

查看答案
更多问题

_________ is a private network that uses a public network to connect users.

A. DoS
B. ERP
C. RFID
D. VPN

An employee at Company A receive an email and opened the attachment contained within the message. Shortly afterwards all employees were blocked from accessing files on the company’s servers and the criminal told the Company A they would have to pay a large amount of Bitcoin to regain access to their files. Company A was a victim of _____

A. ransomware
B. identity theft
C. spyware
D. cyber warfare
E. phishing attack

What are the three legs of the sustainability model discussed in class?

A. Environmental , Political, Economic
B. Environmental, Social , Economic
C. Profitability, Explitation, Consumption
D. None of the above.

Which of the following is the most accurate statement?

A. Computing uses a substantial amount of power and is responsible for substantial greenhouse gas emissions.
B. Information Systems can be used to reduce the environmental impact of human activities by making them more energy-efficient.
C. Smart buildings can use information systems to be carbon neutral.
D. Both (a) and (b) accurate.
E. Both (a) and (c) accurate.

答案查题题库