题目内容

A(n) _______ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information.

A. viral
B. phishing
C. rogue
D. worm

查看答案
更多问题

_______ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver.

A. Scams
B. Zombies
C. Rogues
D. Trojan horses

_______ is the process of coding information to make it unreadable except to those who have a special piece of information known as a key.

A. Encryption
B. Prevention
C. Decryption
D. Restriction

_______ scanning devices use fingerprints and iris scanners to identify individuals.

A. Visual
Biometric
C. Optical
D. Virtual

_______ encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet.

A. Loggers
Biometrics
C. Virtual private networks
D. Web bugs

答案查题题库