CSS246
Question: The five different methods for encrypting data are Data Encryption Standard, —, Skipjack, Capstone and Privacy Enhanced Mail
Answer: Algorithm
Question: According to security experts, the best way to protect any type of data is to — it
Answer: encrypt
Question: Electronic eavesdropping can be done on traditional telephone lines and satellite transmission networks through technologically advanced — devices
Answer: listening
Question: Good physical security is a combination of defensive principles designed to\ndeter, delay, detect, respond and ultimately — to intrusion to critical physical spaces
Answer: deny access
Question: Potential hazards to essential computer systems are disasters such as fire, — and earthquake \n
Answer: flood
Question: The three main components to physical security are method, obstacle and
Answer: surveilance and notification system
Question: The term PIR stands for
Answer: passive\ninfrared based technology
Question: Identity — is the use of another user’s information to pose as a false user
Answer: cloning
Question: The three methods Computer systems can use to determine if a person has a legitimate right to access asystem are who you are, what you know and —
Answer: what you have
Question: While on the network, — have a right to monitor their own systems and they have the right to be informed regarding such monitoring activities
Answer: employers
Whatsapp: 08039407882 for your Free Past Questions I Exam Summary I Free Past Tma Questions I To become a Tutor
Follow on Twitter for your Free Exams Summary I Online Tutorial I Projects Writeups