Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
3 Cards in this Set
- Front
- Back
An example of malicious human activity could include an employee who, in the course of backing up a database, inadvertently installs an old database on top of the current one.
|
A. True
B. False Answer: FALSE |
|
Drive-by spoofers take computers with wireless connections through an area and search for unprotected wireless networks.
|
A. True
B. False Answer: FALSE |
|
The IT department should set the security policy for an organization.
A. True B. False |
A. True
B. False Answer: FALSE |