Question: 1
Which of the following is a telecommunication service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between end-points in a wide area network (WAN)?
Question: 2
Which of the following policies is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly?
Question: 3
Which of the following biometric devices is used to take impressions of the friction ridges of the skin on the underside of the tip of the fingers?
Question: 4
Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blogs, DNS listings, and Web pages. He then sends a large number of unsolicited commercial e-mail (UCE) messages to these addresses. Which of the following e-mail crimes is Peter committing?
Question: 5
Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?