Заглавная страница Избранные статьи Случайная статья Познавательные статьи Новые добавления Обратная связь КАТЕГОРИИ: АрхеологияБиология Генетика География Информатика История Логика Маркетинг Математика Менеджмент Механика Педагогика Религия Социология Технологии Физика Философия Финансы Химия Экология ТОП 10 на сайте Приготовление дезинфицирующих растворов различной концентрацииТехника нижней прямой подачи мяча. Франко-прусская война (причины и последствия) Организация работы процедурного кабинета Смысловое и механическое запоминание, их место и роль в усвоении знаний Коммуникативные барьеры и пути их преодоления Обработка изделий медицинского назначения многократного применения Образцы текста публицистического стиля Четыре типа изменения баланса Задачи с ответами для Всероссийской олимпиады по праву Мы поможем в написании ваших работ! ЗНАЕТЕ ЛИ ВЫ?
Влияние общества на человека
Приготовление дезинфицирующих растворов различной концентрации Практические работы по географии для 6 класса Организация работы процедурного кабинета Изменения в неживой природе осенью Уборка процедурного кабинета Сольфеджио. Все правила по сольфеджио Балочные системы. Определение реакций опор и моментов защемления |
What is Secure Socket Layer (SSL)?
A. two-factor authentication B. illegal access to a computer system C. malicious software D. a method of encryption * E. antivirus software Two-factor authentication include next independent forms of identification as A. your name and an email adress B. your name and a password or PIN number* C. your loginand a password D. your account and ip adress E. your sername and fullname
Who are Hackers? A. are people who serves your computer system B. are people who protects your computer system C. are people who is troubleshooing in your computer system D. are people who try to gain illegal access to a computer system* E. a branch of computer security specifically related to the internet
Cyber security is A. a method of encryption information in computer system B. illegal access to a computer system C. a branch of computer security specifically related to the internet * D. method of Hackers, which hack codes in a computer system E. the type of services a computer system
Hacking, denial of service attack, virus dissemination, computer vandalism are types of A. Cyber Terrorism B. Software Piracy C. Cyber Crime * D. Antivirus softwares E. Cyber security
A cyber criminal is a A. are people who protects your computer system B. are people who is troubleshooing in your computer system C. are people who try to gain illegal access to a computer system D. a branch of computer security specifically related to the internet E. person who uses computers and the Internet to commit crimes*
Cyber Sapiens is A. A prefix that indicates relevance to, or involvement with, computers, computer systems, and electronic control systems B. The study of control system theory in terms of the relationship between animal and machine behavior C. An expression for a computer or robot with artificial intelligence (AI) on the forefront of current technology* D. The usage of computers and the Internet in conducting warfare in the cyberspace E. A kind of cyber attack which results in unavailability of service.
The usage of computers and the Internet in conducting warfare in the cyberspace is A. Cyber vandalism B. Cyber war* C. Hacktivism D. Denial of Service E. Cybernetics
Cyber vandalism is A. Combination of words: “hack(er)” and “activism” B. A kind of cyber attack which results in unavailability of service C. Cyber attacks that deface web pages* D. Denial of Service E. Alternative expression for information super highway
What is Identity Theft? A. software false negative, false positive, rootkit, security software, capabilities sweep, virus removal software, web page analysis B. anti-virus software, backup, block, cyber criminal, detect C. attack, audit log, authenticated, backdoor, bug, firewall, Checking Measures intruder, keylogger, popup, protocol, security certainty D. card scanning, cyber, fraud, harming, identity theft, Discussing malware, phishing, pretexting, scanner, spyware, suspicions Trojan horse, worm* E. overwriting virus, piggybacking, replicate, resident possible
Preventative Email is virus which A. software false negative, false positive, rootkit, security software, capabilities sweep, virus removal software, web page analysis B. anti-virus software, backup, block, cyber criminal, detect C. attack, audit log, authenticated, backdoor, bug, firewall, Checking Measures intruder, keylogger, popup, protocol, security certainty* D. card scanning, cyber, fraud, harming, identity theft, Discussing malware, phishing, pretexting, scanner, spyware, suspicions Trojan horse, worm E. overwriting virus, piggybacking, replicate, resident possible
Cloud computing
|
||||
Последнее изменение этой страницы: 2019-08-18; просмотров: 288; Нарушение авторского права страницы; Мы поможем в написании вашей работы! infopedia.su Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Обратная связь - 3.144.212.145 (0.005 с.) |