题目内容

_______ encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet.

A. Loggers
Biometrics
C. Virtual private networks
D. Web bugs

查看答案
更多问题

_______ is concerned with protecting software and data from unauthorized tampering or damage.

A. Cloud computing
B. Decryption
C. Phishing
Data security

As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the _______.

A. firewall
B. disaster recovery plan
C. encryption device
D. loss prevention team

A(n) _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

A. Trojan horse
B. dictionary
C. web bug
D. denial of service

_______ is representing some other person’s work and ideas as your own without giving credit to the original source.

A. Blogging
B. Phishing
C. Plagiarism
D. Key logging

答案查题题库