Вопросы по дисциплине:
Кибер-безопасность
Сбросить фильтр
№ | Вопрос | Действия |
---|---|---|
31 | All Of the following are examples Of real security and privacy threats except … | Открыть |
32 | … is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing | Открыть |
33 | … monitors user activity on internet and transmit that information in the background to someone else | Открыть |
34 | Firewall is a type of … | Открыть |
35 | Which of the following is an internal threat to a computer or a computer network … | Открыть |
36 | Passwords are used to improve the … | Открыть |
37 | By security in e-Commerce we mean … | Открыть |
38 | To set a secure password you need to … | Открыть |
39 | … is not an examples of cyber attacks | Открыть |
40 | To prevent cyber-attack in your organization you need to … | Открыть |