Exam 6: Data Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____________________ are rules that limit the directories and files that each user can access.

(Short Answer)
4.9/5
(30)

Hand-geometry scanners and voice recognition are examples of ____________________ devices.

(Short Answer)
4.7/5
(40)

Which of the following is NOT a method used in a disaster recovery plan?

(Multiple Choice)
4.8/5
(32)

  Item 1 in the figure above indicates ____. Item 1 in the figure above indicates ____.

(Multiple Choice)
4.7/5
(31)

A RAT is a type of ____.

(Multiple Choice)
4.9/5
(27)

Malware is created and unleashed by ____.

(Multiple Choice)
4.8/5
(45)

A ____ is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files on the same computer.

(Multiple Choice)
4.9/5
(39)

Developing steps to recover from an unavoidable disaster is one step in the process of risk management.

(True/False)
4.9/5
(35)

Which of the following is NOT one of the steps a worm makes when infecting a computer system?

(Multiple Choice)
4.9/5
(34)

A ____ is the basis for scrambling and unscrambling the data transmission between wireless devices.

(Multiple Choice)
4.9/5
(44)

A power ____ can be caused by a malfunction in the power distribution network.

(Multiple Choice)
4.9/5
(37)
Showing 81 - 91 of 91
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)