Question 1 0 out of 10 points What forges the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender? Correct Answer: Question 2 10 out of 10 points In order to intercept communications on __________ networks, drive-by sniffers simply drive or walk around with computers with wireless connections. Correct Answer: B. Question 3 10 out of 10 points Because they kept giving out passwords to users who claimed to have forgotten them, the ____________ were a serious security risk in the
organization. Correct Answer: Question 4 10 out of 10 points Users often resist biometric identification because they feel it is... Correct Answer: C. Question 5 0 out of 10 points A ______________ is someone who pretends to be a legitimate company and sends email requesting confidential data. Correct Answer: A. Question 6 10 out of 10 points Which of the following can be a result of computer crimes? Correct Answer: Question 7 10 out of 10 points Users should scan their computers with anti-malware
programs at least Correct Answer: week Question 8
You've reached the end of your free preview.
Want to read all 9 pages?
- Fall '09
- Correct Answer, riskmanagement, ObjectOriented