M8 Formative Questions Flashcards
Analog signatures help to prevent email forgery.
false
Some perpetrators use a technique called ___ in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network.
war driving
A(n) ___ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.
UPS
someone who uses email as a vehicle for extortion, and they send an organization an email saying they will expose information.
cyberextortionist
A wireless access point (WAP) should be configured to broadcast a network name, in order to increase security
false
A system ____ is the prolonged malfunction of a computer
failure
A(n) ____ source is a company or person a user believes will not send a virus-infected file knowingly
trusted
A brownout is a complete power failure
false (blackout)