Which is NOT a tool hackers use to gain access to and take control of your computer?
a. Trojan horse
b. backdoor programs
c. rootkits
d. phishing software
D
You might also like to view...
Which of the following commands can be used to shut down a group or a range of interfaces?
a. SwitchA(config)# interface range Gigabitethernet1/1-24 b. SwitchA# interface range Gigabitethernet1/1-24 c. SwitchA(config) interface range Gigabitethernet1/1 to24 d. SwitchA(config)# interface Gigabit ethernet range 1/1-24
Corporations may underreport cybercrimes because of concerns about data breach liabilities, damage to brand, regulatory issues, and loss of consumer confidence
Indicate whether the statement is true or false.
Which of the following statements best describes functional exercises?
A. Testing conducted at the enterprise level with a full simulation of a disaster with suspending all operations B. Scenario-driven exercises but limited in scope to simulate a failure of a critical business function C. A discussion-based exercise that does not involve deploying equipment or other resources D. A systematic walkthrough of the procedures to determine disaster readiness
Which of the following applications is included with Microsoft Office Standard 2010?
A. SharePoint Workspace B. InfoPath C. Communicator D. OneNote