General MCQ

The increased use of data mining can be attributed to the ________.

Answer

Correct Answer: Increased availability of data

Note: This Question is unanswered, help us to find answer for this one

The first rule of computer security is to check ___________.

Answer

Correct Answer: Patches

Note: This Question is unanswered, help us to find answer for this one

Sources of security threats include all of the following except ________.

Answer

Correct Answer: The​ CIO's departure from the company

Note: This Question is unanswered, help us to find answer for this one

Most information security incidents will occur because of _________.

Answer

Correct Answer: Users who do not follow secure computing practices and procedures

Note: This Question is unanswered, help us to find answer for this one

Most encryption for data stored on a laptop uses ____ cryptography.

Answer

Correct Answer: Private key

Note: This Question is unanswered, help us to find answer for this one

Botnets function with the use of ________.

Answer

Correct Answer: Malware

Note: This Question is unanswered, help us to find answer for this one

A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource.

Answer

Correct Answer: Zombie

Note: This Question is unanswered, help us to find answer for this one

____ look for specific words and block email messages containing those words.

Answer

Correct Answer: Spam filters

Note: This Question is unanswered, help us to find answer for this one