What is Secure Socket Layer (SSL)? 


Мы поможем в написании ваших работ!



ЗНАЕТЕ ЛИ ВЫ?

What is Secure Socket Layer (SSL)?



A. two-factor authentication

B. illegal access to a computer system

C. malicious software

D. a method of encryption *

E. antivirus software

Two-factor authentication include next independent forms of identification as

A. your name and an email adress

B. your name and a password or PIN number*

C. your loginand a password

D. your account and ip adress

E. your sername and fullname

 

Who are Hackers?

A. are people who serves your computer system

B. are people who protects your computer system

C. are people who is troubleshooing in your computer system

D. are people who try to gain illegal access to a computer system*

E. a branch of computer security specifically related to the internet

 

Cyber security is

A. a method of encryption information in computer system

B. illegal access to a computer system

C. a branch of computer security specifically related to the internet *

D. method of Hackers, which hack codes in a computer system

E. the type of services a computer system

 

Hacking, denial of service attack, virus dissemination, computer vandalism are types of

A. Cyber Terrorism

B. Software Piracy

C. Cyber Crime *

D. Antivirus softwares

E. Cyber security

 

A cyber criminal is a

A. are people who protects your computer system

B. are people who is troubleshooing in your computer system

C. are people who try to gain illegal access to a computer system

D. a branch of computer security specifically related to the internet

E. person who uses computers and the Internet to commit crimes*

 

Cyber Sapiens is

A. A prefix that indicates relevance to, or involvement with, computers, computer systems, and electronic control systems

B. The study of control system theory in terms of the relationship between animal and machine behavior

C. An expression for a computer or robot with artificial intelligence (AI) on the forefront of current technology*

D. The usage of computers and the Internet in conducting warfare in the cyberspace

E. A kind of cyber attack which results in unavailability of service.

 

The usage of computers and the Internet in conducting warfare in the cyberspace is

A. Cyber vandalism

B. Cyber war*

C. Hacktivism

D. Denial of Service

E. Cybernetics

 

Cyber vandalism is

A. Combination of words: “hack(er)” and “activism”

B. A kind of cyber attack which results in unavailability of service

C. Cyber attacks that deface web pages*

D. Denial of Service

E. Alternative expression for information super highway

 

What is Identity Theft?

A. software false negative, false positive, rootkit, security software, capabilities sweep, virus removal software, web page analysis

B. anti-virus software, backup, block, cyber criminal, detect

C. attack, audit log, authenticated, backdoor, bug, firewall, Checking Measures intruder, keylogger, popup, protocol, security certainty

D. card scanning, cyber, fraud, harming, identity theft, Discussing malware, phishing, pretexting, scanner, spyware, suspicions Trojan horse, worm*

E. overwriting virus, piggybacking, replicate, resident possible

 

Preventative Email is virus which

A. software false negative, false positive, rootkit, security software, capabilities sweep, virus removal software, web page analysis

B. anti-virus software, backup, block, cyber criminal, detect

C. attack, audit log, authenticated, backdoor, bug, firewall, Checking Measures intruder, keylogger, popup, protocol, security certainty*

D. card scanning, cyber, fraud, harming, identity theft, Discussing malware, phishing, pretexting, scanner, spyware, suspicions Trojan horse, worm

E. overwriting virus, piggybacking, replicate, resident possible

 

Cloud computing

 



Поделиться:


Последнее изменение этой страницы: 2019-08-18; просмотров: 288; Нарушение авторского права страницы; Мы поможем в написании вашей работы!

infopedia.su Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Обратная связь - 3.144.212.145 (0.005 с.)