General MCQ

General

1. The increased use of data mining can be attributed to the ________.

Answer

Correct Answer: Increased availability of data

Note: This Question is unanswered, help us to find answer for this one

2. The first rule of computer security is to check ___________.

Answer

Correct Answer: Patches

Note: This Question is unanswered, help us to find answer for this one

3. Sources of security threats include all of the following except ________.

Answer

Correct Answer: The​ CIO's departure from the company

Note: This Question is unanswered, help us to find answer for this one

4. Most information security incidents will occur because of _________.

Answer

Correct Answer: Users who do not follow secure computing practices and procedures

Note: This Question is unanswered, help us to find answer for this one

5. Most encryption for data stored on a laptop uses ____ cryptography.

Answer

Correct Answer: Private key

Note: This Question is unanswered, help us to find answer for this one

6. Botnets function with the use of ________.

Answer

Correct Answer: Malware

Note: This Question is unanswered, help us to find answer for this one

7. A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource.

Answer

Correct Answer: Zombie

Note: This Question is unanswered, help us to find answer for this one

8. ____ look for specific words and block email messages containing those words.

Answer

Correct Answer: Spam filters

Note: This Question is unanswered, help us to find answer for this one

search