This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.
A. Worm
B. Fake
C. Virus
D. Rogue
查看答案
The process of coding information to make it unreadable except to those who have a special piece of information known as a key.
A. Restriction
B. Security
C. Protection
D. Encryption
A _______ acts as a security buffer between a corporation's private network and all external networks.
A. firewall
B. password
C. disaster recovery plan
D. virus checker
Which of the following is the most widely used wireless network encryption for home wireless networks?
A. WEP
B. WPE
C. WPA
D. WPA2
Which of the following is not a measure to protect computer security?
A. Restricting access
B. Encrypting data
Copying data and storing it at a remote location
D. Keeping the same password on all systems consistently