• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/3

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

3 Cards in this Set

  • Front
  • Back
An example of malicious human activity could include an employee who, in the course of backing up a database, inadvertently installs an old database on top of the current one.
A. True
B. False
Answer: FALSE
Drive-by spoofers take computers with wireless connections through an area and search for unprotected wireless networks.
A. True
B. False
Answer: FALSE
The IT department should set the security policy for an organization.
A. True
B. False
A. True
B. False
Answer: FALSE