Exam 5: Protecting Information Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Similar to phishing, _____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.

(Multiple Choice)
4.8/5
(32)

Which of the following forms of text needs to be unscrambled using a decryption key?

(Multiple Choice)
4.9/5
(32)

The main function of Cyber Incident Response Capability (CIRC) is to _____.

(Multiple Choice)
4.9/5
(36)

__________is used to encrypt the data sent through a virtual private network (VPN).

(Multiple Choice)
5.0/5
(47)
Showing 81 - 84 of 84
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)