-
What is Differential Backup?
Date posted:
May 17, 2019
-
Define Local backup.
Date posted:
May 17, 2019
-
Describe the Protection of computers from Power Interruptions.
Date posted:
May 17, 2019
-
What is Biometric authentication?
Date posted:
May 17, 2019
-
Define Token authentication?
Date posted:
May 17, 2019
-
What is Password authentication?
Date posted:
May 17, 2019
-
Define Dumpster Diving.
Date posted:
May 17, 2019
-
What is Wiretapping?
Date posted:
May 17, 2019
-
What is Eavesdropping on Emanations?
Date posted:
May 17, 2019
-
Describe Denial or Degradation of Service.
Date posted:
May 17, 2019
-
Define Masquerading.
Date posted:
May 17, 2019
-
Define software piracy.
Date posted:
May 17, 2019
-
What is Traffic Analysis?
Date posted:
May 17, 2019
-
Describe Trap Doors.
Date posted:
May 17, 2019
-
Define Botnets.
Date posted:
May 17, 2019
-
Define a Ransomware.
Date posted:
May 17, 2019
-
Define Salamis.
Date posted:
May 17, 2019
-
Describe Logic Bombs.
Date posted:
May 17, 2019
-
What is Data Diddling?
Date posted:
May 17, 2019
-
Define IP Spoofing.
Date posted:
May 17, 2019
-
Describe Password Sniffing.
Date posted:
May 17, 2019
-
Define Rootkits.
Date posted:
May 17, 2019
-
Define Keyloggers.
Date posted:
May 17, 2019
-
Excess Privileges.
Date posted:
May 17, 2019
-
Define a Zero Day Attack.
Date posted:
May 17, 2019
-
Describe social engineering.
Date posted:
May 17, 2019
-
What is Pharming?
Date posted:
May 17, 2019
-
What is Phishing?
Date posted:
May 17, 2019
-
Define electronic spamming.
Date posted:
May 17, 2019
-
Describe the ways of detecting scanning attacks.
Date posted:
May 17, 2019