Filters
Question type

Study Flashcards

Malicious code includes a variety of threats such as ______________, worms, and Trojan horses.

Correct Answer

verifed

verified

What area of information security focuses on preventing identity theft, phishing, and pharming scams?


A) Prevention and resistance
B) Detection and authorizing
C) Detection and response
D) Authentication and authorization

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Information security policies detail how an organization will implement the information security plan.

A) True
B) False

Correct Answer

verifed

verified

_____________ is a contractual stipulation to ensure that ebusiness participants do not deny their online actions.

Correct Answer

verifed

verified

What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?


A) Token
B) Password
C) Smart card
D) Biometrics

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 221 - 225 of 225

Related Exams

Show Answer