Questions LLC
Login
or
Sign Up
Ask a New Question
Security
Page 3
Questions (181)
The chief executive officer (CEO) of an organization asked you to audit the physical security of their building. You noticed
1 answer
asked anonymously
22 views
What role does access control have within a physical setting?(1 point)
Responses It allows for users to freely move around a
1 answer
asked anonymously
29 views
What role does access control have within a physical setting?(1 point)
Responses It allows for users to freely move around a
1 answer
asked anonymously
28 views
41.Which one of the following is intentional threat to the security of medical information?
a.Environmental hazard b. Human
1 answer
asked anonymously
19 views
To access a restricted area, individuals must have an identification card with a security clearance level greater than 3. Which
1 answer
asked by
Sunshine124
73 views
To access a restricted area, individuals must have an identification card with a security clearance level greater than 3.
Which
1 answer
asked by
BOThelper
13 views
What physical structure could you use to help prevent people from piggybacking on someone else's credentials?
A. mantrap B. door
1 answer
asked by
young_240sx
19 views
What action would be sufficient to execute code from a USB drive?
A. you just need to insert the drive B. you just need to scan
1 answer
asked by
young_240sx
28 views
Before establishing a security program, organizations should __________.
Question 6 options: check temperature and humidity
1 answer
asked by
KO
24 views
In the context of security, _____ is an attack that takes advantage of the human element of security systems.
Question 7 options:
1 answer
asked by
KO
20 views
Which of the following is an example of an internal threat?(1 point) Responses employee who exploits systems employee who
1 answer
asked by
hatemaths
19 views
What is the goal of Safe Code?(1 point) Responses to ensure software integrity to ensure software integrity to demonstrate
1 answer
asked by
hatemaths
26 views
What is the most complete explanation of the Zero Trust Methodology?(1 point) Responses No device is considered trusted, and
1 answer
asked by
hatemaths
23 views
What role does access control have within a physical setting?(1 point) Responses It allows for users to freely move around a
1 answer
asked by
hatemaths
24 views
The chief executive officer (CEO) of an organization asked you to audit the physical security of their building. You noticed
1 answer
asked by
hatemaths
19 views
What external threat could potentially compromise the security of an organization?
A. an authorized delivery driver B. poor
1 answer
asked by
young_240sx
23 views
Which of the following is an example of an internal threat?
A. a power surge from a thunderstorm B. employee who exploits systems
1 answer
asked by
young_240sx
11 views
Policies are the foundation of devising an effective security solution. What is the best way to implement the policies with
1 answer
asked by
young_240sx
40 views
Problem
Which of the following could be a way that someone could steal your drivers license number? Choose 1 answer: Choose 1
1 answer
asked anonymously
21 views
Components of deterrence
1 answer
asked anonymously
22 views
Your computer keeps having annoying pop-ups opening asking for you to purchase a software application and for your personal
1 answer
asked by
Donald Craven
45 views
Policies are the foundation of devising an effective security solution. What is the best way to implement the policies with
1 answer
asked by
Donald Craven
44 views
What role does access control have within a physical setting?(1 point)
Responses It allows for users to freely move around a
1 answer
asked by
Donald Craven
38 views
The chief executive officer (CEO) of an organization asked you to audit the physical security of their building. You noticed
1 answer
asked by
Donald Craven
57 views
Question 4 (Marks: 25)
Your campus where you are currently studying has just appointed you as a part of a task force to assess
1 answer
asked anonymously
46 views
A corporation is concerned that their code is being stolen by a different company, so they implement new procedures for logging
1 answer
asked by
young_240sx
13 views
What role does access control have within a physical setting?
A. it allows for the surveillance of users as they enter and leave
1 answer
asked by
young_240sx
13 views
All client computers that try to access an access point are required to include an _____ in all their packets.
Question 4
1 answer
asked by
KO
12 views
Read the following excerpt from Passage 2.
Bitcoin and other cryptocurrencies do not offer indemnity from thieves. Consider the
1 answer
asked anonymously
20 views
Which threats do cartels pose to Mexico and central America
1 answer
asked by
That girl
18 views
Before you can purchase an item in an online store, you have to enter the number on the back of your credit card. This is an
1 answer
asked anonymously
33 views
Facial recognition technology has the potential to deliver significant benefits, including increased security, convenience and
1 answer
asked anonymously
14 views
2. Are the cupboards locked?
1 answer
asked anonymously
9 views
The word hashing literally means to scramble. (2 points)
True False
1 answer
asked anonymously
28 views
Read the following prompt:
Write about the controversy over securing your phone with a password or a fingerprint. Which option
1 answer
asked anonymously
13 views
Cryptography is defined as:(2 points)Responses The practice of encoding information so only authorized people can read it. The
1 answer
asked by
dee
19 views
Cryptography is defined as:(2 points)
Responses The practice of encoding information so only authorized people can read it. The
1 answer
asked by
@~@
38 views
_______________ is the output from any input that has been processed through a hashing algorithm/function.(2
1 answer
asked by
dee
13 views
Cryptography is defined as:(2 points)
Responses Verified authority to view information, such as a password or key. Verified
1 answer
asked by
ANSWER CORRECTLY
15 views
The practice of solving and writing encryptions is ______________.(2 points)
Responses cryptography cryptography cryptology
1 answer
asked anonymously
12 views
Hash functions got the name "hash" because it's easy to compute the function with a given input, but nearly impossible to
1 answer
asked anonymously
38 views
indicate if the following statement is true or false: It is recommended that you turn off Bluetooth when not in use, as it can
1 answer
asked anonymously
20 views
Cryptography is defined as:(2 points) Responses Verified authority to view information, such as a password or key. Verified
1 answer
asked anonymously
16 views
Cryptography is defined as:(2 points) Responses Verified authority to view information, such as a password or key. Verified
1 answer
asked by
william Alexaner
47 views
Cryptography is defined as:(2 points)
Responses A. The practice of encoding information so only authorized people can read it. B.
1 answer
asked anonymously
15 views
Cryptography is defined as:(2 points) Responses The practice of encoding information so only authorized people can read it. The
1 answer
asked anonymously
35 views
What can you do to deter identity saft
1 answer
asked by
..l
16 views
If someone uses their smartphone with the unsecured Wi-Fi network at a store to check their bank balance, they may become the
1 answer
asked by
Johovah_Witness
12 views
Give me five clues that are not obvious for protection service
1 answer
asked anonymously
7 views
Give me five clues that are not difficult protection service building
1 answer
asked anonymously
8 views
Pages
1
2
3
4
Parent Categories (41)
Access Technologies
Accessibility
Artificial Intelligence
Banking
Business
Cloud Computing
Communication and Records
Computer Networking
Computer Science
Computer Science/Technology
Computer Systems
Computers
Computing
Cryptocurrency
Finance
Global issues
Government
Government and Public Service
Home Safety
International Relations
Internet
Internet of Things
Internet Safety
IT and Technology
Law and Society
Networking
North Korea's Threats
Operating Systems
Privacy
Programming
Safety
Science and Technology
Social Issues
Software
Software Development
Standards and Regulations
Surveillance
Systems Development
Technology
Transportation
Wireless Networking