1. Baiting is in similar to phishing attacks. However, what distinguishes it from phishing is the promise...
Question:
2. Tailgating or "piggybacking" takes place when an unauthorized person follows an employee into a restricted area for example an individual impersonates a help desk employee. True or False?
3. Asymmetric encryption uses one key. True or False?
4. E-commerce transaction security is concerned with all of the following issues except:
a. Use of a firewall
b. Confidentiality
c. Authentication
d. Non repudiation of origin
5. All of the following are a part of a comprehensive security system except:
a. Raise employees' awareness of security problems.
b. Install software patches and updates on operating systems on a regular basis
c. Limit computer access to authorized personnel only
d. Do not post the security policy in a visible place
6. All of the following are among the techniques used by social engineers except:
a. Dumpster diving
b. Tailgating
c. Continuity planning
d. Pre-texting
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Related Book For
Question Posted: