题目内容

Rogue Wi-Fi hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites.

A. 对
B. 错

查看答案
更多问题

Biometric scanning devices are used to scan employee identification cards.

A. 对
B. 错

Computer security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.

A. 对
B. 错

A rogue attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account.

A. 对
B. 错

The most common protocol for website encryption is https (Hypertext Transfer Protocol Secure).

A. 对
B. 错

答案查题题库