Corporations often use this to prevent copyright violations.
A. Digital Millennium Copyright Act
B. Website encryption
C. Digital rights management (DRM)
D. Keystroke loggers
查看答案
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
A. Encryption
B. Firewall
C. Password
Dictionary attack
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.
A. Worm
B. Fake
C. Virus
D. Rogue
The process of coding information to make it unreadable except to those who have a special piece of information known as a key.
A. Restriction
B. Security
C. Protection
D. Encryption
A _______ acts as a security buffer between a corporation's private network and all external networks.
A. firewall
B. password
C. disaster recovery plan
D. virus checker