_________ controls restrict unauthorized individuals from using information resources.
Access
B. Communications
C. Physical
D. Useful
查看答案
A(n) _________ is a software package that attempts to identify and eliminate viruses and worms.
A. anti-malware system
B. DMZ
C. ERP
D. firewall
_________ is a private network that uses a public network to connect users.
A. DoS
B. ERP
C. RFID
D. VPN
An employee at Company A receive an email and opened the attachment contained within the message. Shortly afterwards all employees were blocked from accessing files on the company’s servers and the criminal told the Company A they would have to pay a large amount of Bitcoin to regain access to their files. Company A was a victim of _____
A. ransomware
B. identity theft
C. spyware
D. cyber warfare
E. phishing attack
What are the three legs of the sustainability model discussed in class?
A. Environmental , Political, Economic
B. Environmental, Social , Economic
C. Profitability, Explitation, Consumption
D. None of the above.