Beruflich Dokumente
Kultur Dokumente
Question 1
0 out of 1 points
True
False
Response Feedback:
Question 2
1 out of 1 points
False
False
Response Feedback:
Question 3
1 out of 1 points
When you interview for a job at a company, it is likely that the company will Google you
and search social networking sites for information on you.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 4
1 out of 1 points
The higher the level of an employee in organization, the lower the threat that he or she
poses to the organization.
Answer
Selected Answer:
Correct Answer:
False
False
Response Feedback:
Question 5
1 out of 1 points
False
False
Response Feedback:
Question 6
1 out of 1 points
To defend itself against downstream liability, a company must prove that it practices due
diligence in information security.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 7
0 out of 1 points
D.
always illegal because it is considered trespassing.
Correct Answer:
C.
typically committed for the purpose of identity theft.
Question 8
0 out of 1 points
Which of the following factors are not increasing the threats to information security?
Answer
Selected Answer:
E.
due diligence
Correct Answer:
A.
limited storage capacity on portable devices
Question 9
1 out of 1 points
A.
something the user knows.
Correct Answer:
A.
something the user knows.
Question 10
1 out of 1 points
An organization's e-mail policy has the least impact on which of the following software
attacks?
Answer
Selected Answer:
C.
zero-day
Correct Answer:
C.
zero-day
Question 11
1 out of 1 points
A.
Unethical, illegal
Correct Answer:
A.
Unethical, illegal
Question 12
0 out of 1 points
A.
Consistent international privacy and security laws help companies with
their regulatory requirements from country to country.
Correct
Answer:
D.
International privacy and security laws have led to a complex global
legal framework.
Question 1
0 out of 1 points
A.
Worm
Correct Answer:
E.
Alien software
Question 2
1 out of 1 points
D.
Phishing
Correct Answer:
D.
Phishing
Question 3
1 out of 1 points
E.
something the user is.
E.
Question 4
1 out of 1 points
Which of the following factors are not increasing the threats to information security?
Answer
Selected Answer:
C.
limited storage capacity on portable devices
Correct Answer:
C.
limited storage capacity on portable devices
Question 5
1 out of 1 points
A.
typically committed for the purpose of identity theft.
Correct Answer:
A.
typically committed for the purpose of identity theft.
Question 6
1 out of 1 points
An organization's e-mail policy has the least impact on which of the following software
attacks?
Answer
Selected Answer:
C.
zero-day
Correct Answer:
C.
zero-day
Question 7
1 out of 1 points
Trojan horses are software programs that hide in other computer programs and reveal
their designed behavior only when they are activated.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 8
1 out of 1 points
Public-key encryption uses two different keys, one public and one private.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 9
0 out of 1 points
True
Correct Answer:
False
Response Feedback:
Question 10
1 out of 1 points
The higher the level of an employee in organization, the lower the threat that he or she
poses to the organization.
Answer
Selected Answer:
Correct Answer:
False
False
Response Feedback:
Question 11
1 out of 1 points
False
False
Response Feedback:
Question 12
1 out of 1 points
Question 1
0 out of 1 points
False
False
Which of the following is the most important issue raised by the numerous security
breaches at NASA?
Answer
Selected
Answer:
E.
Should NASA be required to detail its problems with cyberespionage
to the taxpayers?
Correct
Answer:
C.
Is it possible to secure the Internet?
Question 2
1 out of 1 points
_____ is the process in which an organization assesses the value of each asset being
protected, estimates the probability that each asset might be compromised, and compares
the probable costs of each being compromised with the costs of protecting it.
Answer
Selected Answer:
D.
Risk analysis
Correct Answer:
D.
Risk analysis
Question 3
1 out of 1 points
_____ is designed to use your computer as a launch pad for sending unsolicited e-mail to
other computers.
Answer
Selected Answer:
D.
Spamware
Correct Answer:
D.
Spamware
Question 4
1 out of 1 points
B.
threat
Correct Answer:
B.
threat
Question 5
1 out of 1 points
An organization's e-mail policy has the least impact on which of the following software
attacks?
Answer
Selected Answer:
B.
zero-day
Correct Answer:
B.
zero-day
Question 6
0 out of 1 points
C.
should be difficult to guess
Correct Answer:
A.
should be shorter rather than longer so the password can be
remembered
Question 7
1 out of 1 points
When you interview for a job at a company, it is likely that the company will Google you
and search social networking sites for information on you.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 8
0 out of 1 points
True
False
Response Feedback:
Question 9
1 out of 1 points
When companies require users to accurately select characters in turn from a series of
boxes, attackers use screen scrapers to capture this information.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 10
1 out of 1 points
To defend itself against downstream liability, a company must prove that it practices due
diligence in information security.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 11
1 out of 1 points
False
False
Response Feedback:
Question 12
1 out of 1 points
The higher the level of an employee in organization, the lower the threat that he or she
poses to the organization.
Answer
Selected Answer:
Correct Answer:
Question 1
False
Fals
0 out of 1 points
_____ involves building an inappropriate trust relationship with employees for the
purpose of gaining sensitive information or unauthorized access privileges.
Answer
Selected Answer:
A.
Hacking
Correct Answer:
E.
Social engineering
Question 2
1 out of 1 points
A(n) _____ is intellectual work that is known only to a company and is not based on
public information.
Answer
Selected Answer:
D.
trade secret
Correct Answer:
D.
trade secret
Question 3
1 out of 1 points
Bob is using public key encryption to send a message to Ted. Bob encrypts the message
with Ted's _____ key and Ted decrypts the message using his _____ key.
Answer
Selected Answer:
B.
public, private
Correct Answer:
B.
public, private
Question 4
1 out of 1 points
_____ is the process in which an organization assesses the value of each asset being
protected, estimates the probability that each asset might be compromised, and compares
the probable costs of each being compromised with the costs of protecting it.
Answer
Selected Answer:
C.
Risk analysis
Correct Answer:
C.
Risk analysis
Question 5
1 out of 1 points
B.
risk mitigation
Correct Answer:
B.
risk mitigation
Question 6
0 out of 1 points
A.
C.
decreases individual privacy.
Question 7
0 out of 1 points
True
False
Response Feedback:
Question 8
1 out of 1 points
A code of ethics is a collection of principles that are intended to guide decision making
by members of the organization.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 9
0 out of 1 points
In most cases, cookies track your path through Web sites and are therefore invasions of
your privacy.
Answer
Selected Answer:
True
Correct Answer:
False
Response Feedback:
Question 10
1 out of 1 points
Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition
systems to cause widespread physical damage.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 11
1 out of 1 points
False
False
Response Feedback:
Question 12
1 out of 1 points
Question 1
True
True
1 out of 1 points
Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition
systems to cause widespread physical damage.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 2
1 out of 1 points
False
False
Response Feedback:
Question 3
1 out of 1 points
False
False
Response Feedback:
Question 4
1 out of 1 points
False
False
Response Feedback:
Question 5
0 out of 1 points
The security of each computer on the Internet is independent of the security of all other
computers on the Internet.
Answer
Selected Answer:
Correct Answer:
True
False
Response Feedback:
Question 6
0 out of 1 points
True
False
Response Feedback:
Question 7
1 out of 1 points
A.
something the user is.
Correct Answer:
A.
something the user is.
Question 8
1 out of 1 points
A.
risk mitigation
Correct Answer:
A.
risk mitigation
Question 9
0 out of 1 points
Employees in which functional areas of the organization pose particularly grave threats to
information security?
Answer
Selected Answer:
B.
finance, management information systems
Correct Answer:
D.
human resources, management information systems
Question 10
0 out of 1 points
Selected Answer:
A.
risk
Correct Answer:
D.
threat
Question 11
0 out of 1 points
E.
something the user knows.
Correct Answer:
B.
something the user does.
Question 12
0 out of 1 points
D.
Viruses
Correct Answer:
A.
Logic bomb
Question 1
0 out of 1 points
A.
tornados
Correct Answer:
B.
malicious software
Question 2
0 out of 1 points
Rank the following in terms of dollar value of the crime, from highest to lowest.
Answer
Selected Answer:
D.
cybercrime robbery white collar crime
Correct Answer:
E.
cybercrime white collar crime robbery
Question 3
0 out of 1 points
C.
executives and executive secretaries.
Correct Answer:
D.
janitors and guards.
Question 4
0 out of 1 points
In a(n) _____ attack, a coordinated stream of requests is launched against a target system
from many compromised computers at the same time.
Answer
Selected Answer:
B.
denial-of-service
Correct Answer:
C.
distributed denial-of-service
Question 5
0 out of 1 points
Which of the following statements is not correct concerning the difficulties in protecting
information resources?
Answer
Selected
Answer:
C.
Computer crimes often remain undetected for a long period of time.
Correct Answer:
A.
Rapid technological changes ensure that controls are effective for
years.
Question 6
0 out of 1 points
B.
spam, keyloggers
A.
Question 7
1 out of 1 points
False
False
Response Feedback:
Question 8
0 out of 1 points
True
False
Response Feedback:
Question 9
1 out of 1 points
False
False
Response Feedback:
Question 10
1 out of 1 points
Public-key encryption uses two different keys, one public and one private.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 11
1 out of 1 points
True
True
Response Feedback:
Question 12
1 out of 1 points
False
False
Question 1
1 out of 1 points
To defend itself against downstream liability, a company must prove that it practices due
diligence in information security.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 2
1 out of 1 points
True
True
Response Feedback:
Question 3
1 out of 1 points
False
False
Response Feedback:
Question 4
1 out of 1 points
In most cases, cookies track your path through Web sites and are therefore invasions of
your privacy.
Answer
Selected Answer:
Correct Answer:
False
False
Response Feedback:
Question 5
1 out of 1 points
False
False
Response Feedback:
Question 6
1 out of 1 points
Trojan horses are software programs that hide in other computer programs and reveal
their designed behavior only when they are activated.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 7
1 out of 1 points
Your company's computers have been taken over by an attacker and used to attack
another organization's information systems. Your problem is which of the following?
Answer
Selected Answer:
D.
downstream liability
Correct Answer:
D.
downstream liability
Question 8
1 out of 1 points
E.
As with normal first-class mail, employers cannot read employee email.
Correct Answer:
E.
As with normal first-class mail, employers cannot read employee email.
Question 9
1 out of 1 points
D.
janitors and guards.
Correct Answer:
D.
janitors and guards.
Question 10
0 out of 1 points
C.
distributed denial-of-service
Correct Answer:
E.
supervisory control and data acquisition
Question 11
1 out of 1 points
E.
Logic bomb
Correct Answer:
E.
Logic bomb
Question 12
1 out of 1 points
B.
decreases individual privacy.
Correct Answer:
B.
decreases individual privacy.
Question 1
1 out of 1 points
A(n) _____ is a document that grants the holder exclusive rights on an invention for 20
years.
Answer
Selected Answer:
B.
patent
Correct Answer:
B.
patent
Question 2
1 out of 1 points
_____ issues involve who may obtain information and how much they should pay for this
information.
Answer
Selected Answer:
E.
Accessibility
Correct Answer:
E.
Accessibility
Question 3
1 out of 1 points
B.
International privacy and security laws have led to a complex global
legal framework.
Correct
Answer:
B.
International privacy and security laws have led to a complex global
legal framework.
Question 4
0 out of 1 points
The computing skills necessary to be a hacker are decreasing for which of the following
reasons?
Answer
Selected
Answer:
A.
International organized crime is training hackers.
Correct
Answer:
B.
Computer attack programs, called scripts, are available for download
from the Internet.
Question 5
0 out of 1 points
Your company's computers have been taken over by an attacker and used to attack
another organization's information systems. Your problem is which of the following?
Answer
Selected Answer:
E.
poor security policies and procedures
Correct Answer:
C.
downstream liability
Question 6
1 out of 1 points
_____ involves building an inappropriate trust relationship with employees for the
purpose of gaining sensitive information or unauthorized access privileges.
Answer
Selected Answer:
A.
Social engineering
Correct Answer:
A.
Social engineering
Question 7
0 out of 1 points
True
False
Response Feedback:
Question 8
1 out of 1 points
True
True
Response Feedback:
Question 9
1 out of 1 points
False
False
Response Feedback:
Question 10
1 out of 1 points
When you interview for a job at a company, it is likely that the company will Google you
and search social networking sites for information on you.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 11
1 out of 1 points
A code of ethics is a collection of principles that are intended to guide decision making
by members of the organization.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 12
1 out of 1 points
When companies require users to accurately select characters in turn from a series of
boxes, attackers use screen scrapers to capture this information.
Answer
Selected Answer:
Correct Answer:
True
True
Question 1
0 out of 1 points
A.
something the user does.
Correct Answer:
C.
something the user is.
Question 2
1 out of 1 points
_____ are software programs that hide in other computer programs and reveal their
designed behavior only when they are activated.
Answer
Selected Answer:
D.
Trojan horses
Correct Answer:
D.
Trojan horses
Question 3
1 out of 1 points
A(n) information system's _____ is the possibility that the system will suffer harm by a
threat.
Answer
Selected Answer:
A.
vulnerability
Correct Answer:
A.
vulnerability
Question 4
1 out of 1 points
Which of the following statements is not correct concerning the difficulties in protecting
information resources?
Answer
Selected
Answer:
A.
Rapid technological changes ensure that controls are effective for
years.
Correct Answer:
A.
Rapid technological changes ensure that controls are effective for
years.
Question 5
0 out of 1 points
_____ issues involve collecting, storing and disseminating information about individuals.
Answer
Selected Answer:
B.
Accessibility
Correct Answer:
A.
Privacy
Question 6
0 out of 1 points
Various organizations that promote fair and responsible use of information systems often
develop _____:
Answer
Selected Answer:
A.
a strategic plan
Correct Answer:
E.
a code of ethics
Question 7
1 out of 1 points
Trojan horses are software programs that hide in other computer programs and reveal
their designed behavior only when they are activated.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 8
0 out of 1 points
A code of ethics is a collection of principles that are intended to guide decision making
by members of the organization.
Answer
Selected Answer:
Correct Answer:
False
True
Response Feedback:
Question 9
0 out of 1 points
The security of each computer on the Internet is independent of the security of all other
computers on the Internet.
Answer
Selected Answer:
Correct Answer:
True
False
Response Feedback:
Question 10
0 out of 1 points
True
False
Response Feedback:
Question 11
1 out of 1 points
To defend itself against downstream liability, a company must prove that it practices due
diligence in information security.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 12
1 out of 1 points
When companies require users to accurately select characters in turn from a series of
boxes, attackers use screen scrapers to capture this information.
Answer
Selected Answer:
Correct Answer:
True
True
Question 1
1 out of 1 points
True
True
Response Feedback:
Question 2
1 out of 1 points
Human errors cause more than half of the security-related problems in many
organizations.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 3
1 out of 1 points
The higher the level of an employee in organization, the lower the threat that he or she
poses to the organization.
Answer
Selected Answer:
Correct Answer:
False
False
Response Feedback:
Question 4
1 out of 1 points
To defend itself against downstream liability, a company must prove that it practices due
diligence in information security.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 5
1 out of 1 points
Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition
systems to cause widespread physical damage.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 6
1 out of 1 points
Trojan horses are software programs that hide in other computer programs and reveal
their designed behavior only when they are activated.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 7
1 out of 1 points
_____ issues involve collecting, storing and disseminating information about individuals.
Answer
Selected Answer:
C.
Privacy
Correct Answer:
C.
Privacy
Question 8
1 out of 1 points
A.
threat
Correct Answer:
A.
threat
Question 9
1 out of 1 points
E.
something the user is.
Correct Answer:
E.
something the user is.
Question 10
1 out of 1 points
C.
Logic bomb
Correct Answer:
C.
Logic bomb
Question 11
0 out of 1 points
In _____, the attacker approaches employees, where in _____ the employees approach
the attacker.
Answer
Selected Answer:
C.
phishing, social engineering
Correct Answer:
A.
social engineering, reverse social engineering
Question 12
0 out of 1 points
A.
An individual's right to privacy supersedes the needs of society.
Correct Answer:
B.
It is difficult to determine and enforce privacy regulations.
Question 1
1 out of 1 points
Trojan horses are software programs that hide in other computer programs and reveal
their designed behavior only when they are activated.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 2
1 out of 1 points
In most cases, cookies track your path through Web sites and are therefore invasions of
your privacy.
Answer
Selected Answer:
Correct Answer:
False
False
Response Feedback:
Question 3
1 out of 1 points
True
True
Response Feedback:
Question 4
1 out of 1 points
The higher the level of an employee in organization, the lower the threat that he or she
poses to the organization.
Answer
Selected Answer:
Correct Answer:
False
False
Response Feedback:
Question 5
1 out of 1 points
When you interview for a job at a company, it is likely that the company will Google you
and search social networking sites for information on you.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 6
1 out of 1 points
Human errors cause more than half of the security-related problems in many
organizations.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 7
1 out of 1 points
B.
It is difficult to determine and enforce privacy regulations.
Correct Answer:
B.
It is difficult to determine and enforce privacy regulations.
Question 8
1 out of 1 points
_____ is designed to use your computer as a launch pad for sending unsolicited e-mail to
other computers.
Answer
Selected Answer:
C.
Spamware
Correct Answer:
C.
Spamware
Question 9
1 out of 1 points
Employees in which functional areas of the organization pose particularly grave threats to
information security?
Answer
Selected Answer:
B.
human resources, management information systems
Correct Answer:
B.
human resources, management information systems
Question 10
0 out of 1 points
_____ issues involve the authenticity and fidelity of information that is collected and
processed.
Answer
Selected Answer:
B.
Privacy
Correct Answer:
A.
Accuracy
Question 11
1 out of 1 points
Various organizations that promote fair and responsible use of information systems often
develop _____:
Answer
Selected Answer:
B.
a code of ethics
Correct Answer:
B.
a code of ethics
Question 12
0 out of 1 points
In its study of various organizations, the Ponemon Institute found that the most common
cause of data breaches was which of the following?
Answer
Selected Answer:
E.
weak passwords
Correct Answer:
A.
employee negligence
Question 1
1 out of 1 points
Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition
systems to cause widespread physical damage.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 2
1 out of 1 points
False
False
Response Feedback:
Question 3
1 out of 1 points
True
True
Response Feedback:
Question 4
1 out of 1 points
False
False
Response Feedback:
Question 5
1 out of 1 points
The security of each computer on the Internet is independent of the security of all other
computers on the Internet.
Answer
Selected Answer:
Correct Answer:
False
False
Response Feedback:
Question 6
1 out of 1 points
Human errors cause more than half of the security-related problems in many
organizations.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 7
1 out of 1 points
B.
Phishing
Correct Answer:
B.
Phishing
Question 8
1 out of 1 points
_____ issues involve the authenticity and fidelity of information that is collected and
processed.
Answer
Selected Answer:
D.
Accuracy
Correct Answer:
D.
Accuracy
Question 9
1 out of 1 points
A(n) information system's _____ is the possibility that the system will suffer harm by a
threat.
Answer
Selected Answer:
A.
vulnerability
Correct Answer:
A.
vulnerability
Question 10
1 out of 1 points
Various organizations that promote fair and responsible use of information systems often
develop _____:
Answer
Selected Answer:
D.
a code of ethics
Correct Answer:
D.
a code of ethics
Question 11
0 out of 1 points
B.
authorization, authentication
Correct Answer:
D.
authentication, authorization
Question 12
1 out of 1 points
Your company's computers have been taken over by an attacker and used to attack
another organization's information systems. Your problem is which of the following?
Answer
Selected Answer:
B.
downstream liability
Correct Answer:
B.
downstream liability
Question 1
1 out of 1 points
E.
should be shorter rather than longer so the password can be
remembered
Correct Answer:
E.
should be shorter rather than longer so the password can be
remembered
Question 2
1 out of 1 points
C.
As with normal first-class mail, employers cannot read employee email.
Correct Answer:
C.
As with normal first-class mail, employers cannot read employee email.
Question 3
1 out of 1 points
C.
Alien software
Correct Answer:
C.
Alien software
Question 4
0 out of 1 points
_____ means verifying processing by checking for known outputs using specific inputs.
Answer
Selected Answer:
D.
Auditing through the computer
Correct Answer:
E.
Auditing around the computer
Question 5
1 out of 1 points
D.
something the user knows.
Correct Answer:
D.
something the user knows.
Question 6
1 out of 1 points
A.
Phishing
Correct Answer:
A.
Phishing
Question 7
1 out of 1 points
Selected Answer:
Correct Answer:
False
False
Response Feedback:
Question 8
1 out of 1 points
A code of ethics is a collection of principles that are intended to guide decision making
by members of the organization.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 9
1 out of 1 points
Cyberterrorism and cyberwarfare can attack supervisory control and data acquisition
systems to cause widespread physical damage.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 10
1 out of 1 points
False
False
Response Feedback:
Question 11
1 out of 1 points
In most cases, cookies track your path through Web sites and are therefore invasions of
your privacy.
Answer
Selected Answer:
Correct Answer:
False
False
Response Feedback:
Question 12
1 out of 1 points
Public-key encryption uses two different keys, one public and one private.
Answer
Selected Answer:
Correct Answer:
True
True
Question 1
1 out of 1 points
B.
decreases individual privacy.
Correct Answer:
B.
decreases individual privacy.
Question 2
1 out of 1 points
_____ is designed to use your computer as a launch pad for sending unsolicited e-mail to
other computers.
Answer
Selected Answer:
E.
Spamware
Correct Answer:
E.
Spamware
Question 3
1 out of 1 points
A(n) _____ is a document that grants the holder exclusive rights on an invention for 20
years.
Answer
Selected Answer:
C.
patent
Correct Answer:
C.
patent
Question 4
1 out of 1 points
B.
something the user knows.
Correct Answer:
B.
something the user knows.
Question 5
1 out of 1 points
E.
threat
Correct Answer:
E.
threat
Question 6
1 out of 1 points
D.
It is difficult to determine and enforce privacy regulations.
Correct Answer:
D.
It is difficult to determine and enforce privacy regulations.
Question 7
1 out of 1 points
In most cases, cookies track your path through Web sites and are therefore invasions of
your privacy.
Answer
Selected Answer:
Correct Answer:
False
False
Response Feedback:
Question 8
1 out of 1 points
A code of ethics is a collection of principles that are intended to guide decision making
by members of the organization.
Answer
Selected Answer:
Correct Answer:
True
True
Response Feedback:
Question 9
1 out of 1 points
The security of each computer on the Internet is independent of the security of all other
computers on the Internet.
Answer
Selected Answer:
Correct Answer:
False
False
Response Feedback:
Question 10
1 out of 1 points
True
True
Response Feedback:
Question 11
1 out of 1 points
False
False
Response Feedback:
Question 12
1 out of 1 points
Public-key encryption uses two different keys, one public and one private.
Answer
Selected Answer:
Correct Answer:
True
True