test 3 - 0 out of 10 points Question 1 What forges the return address on an e-mail so that the e-mail message appears to come from someone other than

test 3 - 0 out of 10 points Question 1 What forges the...

This preview shows page 1 - 4 out of 9 pages.

Question 1 0 out of 10 points What forges the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender? Correct Answer: Question 2 10 out of 10 points In order to intercept communications on __________ networks, drive-by sniffers simply drive or walk around with computers with wireless connections. Correct Answer: B. Question 3 10 out of 10 points Because they kept giving out passwords to users who claimed to have forgotten them, the ____________ were a serious security risk in the
Image of page 1
organization. Correct Answer: Question 4 10 out of 10 points Users often resist biometric identification because they feel it is... Correct Answer: C. Question 5 0 out of 10 points A ______________ is someone who pretends to be a legitimate company and sends email requesting confidential data. Correct Answer: A. Question 6 10 out of 10 points Which of the following can be a result of computer crimes? Correct Answer: Question 7 10 out of 10 points Users should scan their computers with anti-malware
Image of page 2
programs at least Correct Answer: week Question 8
Image of page 3
Image of page 4

You've reached the end of your free preview.

Want to read all 9 pages?

  • Fall '09
  • CHIN
  • Correct Answer, riskmanagement, ObjectOriented

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture