题目内容

This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.

A. Worm
B. Fake
C. Virus
D. Rogue

查看答案
更多问题

The process of coding information to make it unreadable except to those who have a special piece of information known as a key.

A. Restriction
B. Security
C. Protection
D. Encryption

A _______ acts as a security buffer between a corporation's private network and all external networks.

A. firewall
B. password
C. disaster recovery plan
D. virus checker

Which of the following is the most widely used wireless network encryption for home wireless networks?

A. WEP
B. WPE
C. WPA
D. WPA2

Which of the following is not a measure to protect computer security?

A. Restricting access
B. Encrypting data
Copying data and storing it at a remote location
D. Keeping the same password on all systems consistently

答案查题题库