IBL #10 for Joey Squires, Logan Aday and James Linz over Security in Information Technology.
A. A type of authentication that involves solving math problems.
B. Authentication that requires multiple types of input.
C. A password that has alphabetical and numerical characters.
A. They're a type of encryption.
B. They are completely randomized.
C. They cannot be hacked.
A. 802.11g
B. 802.11a
C. 802.11n
A. Distance is too far for wired.
B. Wireless is more secure.
C. Wireless is more reliable.
A. Yes
B. No
A. 802.11g
B. 802.11a
C. 802.11b
A. Increases communication.
B. Allows more confusion.
C. Makes wired connection obsolete.
A. Hashing algorithms.
B. Salted hashes.
C. Blowfish.
A. They can tell you what to do.
B. The site gets money from the sponsor.
C. It shows the site can be trusted with data.
A. Flexibility.
B. Scalability.
C. Both A and B.
A. Allows users to connect to the internet and tunnel back to company resources.
B. Creates new IPs to make the network more organized.
C. Locks out unapproved IPs from connecting.
A. Yes.
B. No.
A. Network worm.
B. Trojan.
C. Keylogger.
A. AFT
B. CJI
C. IBM
A. Workers may leak confidential details.
B. Use more paper.
C. Both A and B.
A. Waiting until it is absolutely necessary for new standards.
B. Listen to big companies to know when to develop them.
C. Develop standards as the need begins to arise.
A. More networks.
B. More people after the data.
C. Both A and B.
A. Malicious sites.
B. Unaware user.
C. Infected downloads.
A. A site doesn't allow validity to be challenged.
B. A malicious site.
C. A site that sells anti-virus.
A. Representatives from government, industry, and high education working together.
B. Representatives from government, industry, and high education debating.
C. Both A and B.
A. Invasion of privacy.
B. Invasion of other peoples' rights.
C. Both A and B.
A. Fingerprinting.
B. Password accounts.
C. IP check.
A. A form of password encryption.
B. A math equation.
C. A cooking recipe.
True.
False.
A. Fired.
B. Reprimanded.
C. No action.