As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the _______.
A. firewall
B. disaster recovery plan
C. encryption device
D. loss prevention team
查看答案
A(n) _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
A. Trojan horse
B. dictionary
C. web bug
D. denial of service
_______ is representing some other person’s work and ideas as your own without giving credit to the original source.
A. Blogging
B. Phishing
C. Plagiarism
D. Key logging
Which part of an information system consists of the rules or guidelines for people to follow?
A. People
B. Procedures
C. Internet
Data
The equipment that processes data in order to create information is called the _______.
A. typology
B. compiler
C. hardware
D. software