Rogue Wi-Fi hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites.
查看答案
Biometric scanning devices are used to scan employee identification cards.
A. 对
B. 错
Computer security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
A. 对
B. 错
A rogue attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account.
A. 对
B. 错
The most common protocol for website encryption is https (Hypertext Transfer Protocol Secure).
A. 对
B. 错