题目内容

As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the _______.

A. firewall
B. disaster recovery plan
C. encryption device
D. loss prevention team

查看答案
更多问题

A(n) _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

A. Trojan horse
B. dictionary
C. web bug
D. denial of service

_______ is representing some other person’s work and ideas as your own without giving credit to the original source.

A. Blogging
B. Phishing
C. Plagiarism
D. Key logging

Which part of an information system consists of the rules or guidelines for people to follow?

A. People
B. Procedures
C. Internet
Data

The equipment that processes data in order to create information is called the _______.

A. typology
B. compiler
C. hardware
D. software

答案查题题库