A) Restriction
B) Security
C) Protection
D) Encryption
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) spyware
B) cookies
C) sniffer programs
D) keystroke loggers
Correct Answer
verified
Essay
Correct Answer
verified
Multiple Choice
A) Employee
B) Hacker
C) Cracker
D) Keystroke logger
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Denial of service attack
B) Viruses
C) Trojan horses
D) Worms
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Illusion of anonymity
B) Browser cache
C) History files
D) Privacy mode
Correct Answer
verified
Multiple Choice
A) Malicious program
B) Internet scam
C) Theft
D) Data manipulation
Correct Answer
verified
Multiple Choice
A) Cookie
B) Global positioning system
C) Keystroke logger
D) Web bug
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Restricting access
B) Encrypting data
C) Copying data and storing it at a remote location
D) Keeping the same password on all systems consistently
Correct Answer
verified
Multiple Choice
A) Piracy
B) Ethics
C) Copyright
D) Privacy
Correct Answer
verified
Showing 1 - 20 of 78
Related Exams