VT CH 10
Terms in this set (9)
virus needs a host file, but a worm does not
The difference between a virus and a worm is a
The device that connects two or more computer networks is called a _
Logging in to eBay
In an office acceptable use policy (AUP), which of the following might be prohibited?
use wireless encryption with a difficult passphrase
To secure your wireless network at home you should
Which of the following cybercrimes is considered to be a form of harassment?
acts like a firewall
A router is a form of security because it
Computer Fraud and Abuse
The ________ Act that was passed by the U.S. Congress in 1986 made it a crime to access classified information
attacks have political or social agendas.
Which of the following would be the strongest password?
YOU MIGHT ALSO LIKE...
Ch. 5 Practest test A
CISS 170 Chapter 5
computer concepts/chapter 5/finale
OTHER SETS BY THIS CREATOR
VT CH 12
VT CH 11
VT CH 09