A digital certificate system:

A digital certificate system: a. uses third-party CAs to validate a user's identity. b. uses digital signatures to validate a user's identity. c....

Biometric authentication:

Biometric authentication: a. is inexpensive. b. is used widely in Europe for security applications. c. can use a person's face as a unique, measurable...

A token is a(n):

A token is a(n): a. device the size of a credit card that contains access permission data. b. type of smart card. c. gadget that displays passcodes. d....

Rigorous password systems:

Rigorous password systems: a. are one of the most effective security tools. b. may hinder employee productivity. c. are costly to implement. d. are...

High-availability computing:

High-availability computing: a. promises continuous availability. b. promises the elimination of recovery time. c. uses online transaction and backup...

A CSO is a:

A CSO is a: a. chief security officer. b. computer security organization. c. chief systems officer. d. continuity systems officer. Answer:...

ISO 17799:

ISO 17799: a. requires financial institutions to ensure the security of customer data. b. specifies best practices in information systems security...

The Sarbanes-Oxley Act:

The Sarbanes-Oxley Act: a. requires financial institutions to ensure the security of customer data. b. specifies best practices in information systems...

Evil twins are:

Evil twins are: a. Trojan horses that appears to the user to be a legitimate commercial software application. b. e-mail messages that mimic the e-mail...

Pharming involves:

Pharming involves: a. redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser. b. pretending...

Phishing involves:

Phishing involves: a. redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser. b. pretending...

How do hackers create a botnet?

How do hackers create a botnet? a. Infecting Web shopping bots with malware b. Using Web search bots to infect other computers c. Causing other people's...

In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of?

In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded...