A+ GRADED. Buy Quality Materials!
Which of the following is true of phishing
It involves sending fraudulent e-mails that seem to come from legitimate sources.
When does spoofing occur?
It occurs when an illegitimate program poses as a legitimate one.
Which of the following is true of a worm?
It is an independent program that can spread itself without attaching itself to a host
program.
Identify an intentional security threat that is a type of Trojan program used to
release a virus, worm, or other destructive code.
logic bomb
In the context of security threats, a ______ combines the characteristics of
computer viruses, worms, and other malicious codes with vulnerabilities found in
public and private networks.
blended threat
_______ is an example of a biometric security measures.
Hand geometry
Which of the following is a type of access control used to protect systems from
unauthorized access?
passwords
A(n)________ is often used so remote users have a secure connection to an
organization's network.
Virtual private network
In data encryption, the https indicates a safe HTTP connection over.
Secure Sockets Layer
_______ encryption uses a public key known only to the recipient.
Asymmetric