Đang chuẩn bị liên kết để tải về tài liệu:
LOCKSMITH AND SECURITY PROFESSIONALS’ EXAM STUDY GUIDE phần 8
Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Đánh dấu các câu trả lời với chính chữ viết tắt thích hợp: (P), (A), hoặc (C). A. "Cán bộ an ninh đồng được xúc tiến bất ngờ." B. "Vâng, cô ấy chắc chắn xứng đáng với nó. Sau khi tất cả, với tất cả những trẻ em ăn, cô ấy sẽ cần tất cả sự giúp đỡ cô ấy có thể nhận được "C. | International Foundation for Protection Officers Certified Protection Officer Interim Examination 241 88. The document used to sign in and out at the front entrance of a facility is often called a register. A. True B. False Unit Four Introduction to Computer Security 89. An e-mail might appear to come from a company executive directing the sale of company assets. In fact the e-mail could have originated from someone completely outside the organization. This is an example of A. Impersonation B. Eavesdropping C. Hacking D. Social engineering 90. The two major problems with passwords are when they are easy to guess based on knowledge of the user for example a favorite sports team and when they are A. Vulnerable to dictionary attacks B. Shared by users C. Created by the system manager D. Based on a foreign language 91. A back door is a potential weakness intentionally left in the security of a computer system or its software by its designers. A. True B. False 92. According to the text motivations for attacks can include all of the following except A. Committing information theft and fraud B. Disrupting normal business operations C. Impressing members of the opposite sex D. Deleting and altering information 93. In general web sites are open doors that often invite an attack. A. True B. False 242 Locksmith and Security Professionals Exam Study Guide 94. Plans for backing up computer files should include A. Regularly scheduled backups B. Types of backups C. The information to be backed up D. All of the above 95. In this tactic a computer system presents itself to the network as though it were a different system. A. E-mail tracking B. Network spoofing C. Encrypting D. Social engineering 96. This technique involves tricking people into revealing their passwords or some form of security information. A. Network spoofing B. Data mining C. Social engineering D. Password cracking Information Security 97. Budget proposals are not critical information as they eventually do become