كل مايخص الحاسوب والبرامج (كمبيوتر -اندرويد) برمجة وغيرها – Telegram
كل مايخص الحاسوب والبرامج (كمبيوتر -اندرويد) برمجة وغيرها
1.26K subscribers
243 photos
4 videos
765 files
177 links
لكل ما يخص الحاسوب
Download Telegram
للطلاب الذي طلبوا مقرر الدكتور ناجي ☝️☝️☝️
للذي ما قدر يذاكر هذا رد الدكتور ناجي الشيباني لطريقة الاختبار

تحياتي 🌹
🔥2
You are trying to explain security to a nontechnical manager. She has taken a rather extreme
view of computer security. Which of the following is one of the extreme viewpoints about
computer security discussed in this chapter?
Anonymous Quiz
70%
There are no imminent dangers to your system.
12%
The federal government will handle security.
9%
. Microsoft will handle security.
9%
There is no danger if you use Linux.
You have just taken over as network security administrator for a small community college. You
want to take steps to secure your network. Before you can formulate a defense for a network,
what do you need?
Anonymous Quiz
22%
Appropriate security certifications
75%
A clear picture of the dangers to be defended against
1%
To finish this textbook
3%
The help of an outside consultant
Mary is teaching an introductory cybersecurity course to freshmen. She is explaining to them
the major threats. Which of the following is not one of the three major classes of threats?
Anonymous Quiz
16%
Attempts to intrude on the system
15%
Denial of service attacks
14%
A computer virus
54%
Online auction fraud
Elizabeth is explaining various hacking terms to a class. She is in the process of discussing
the history of phone system hacking. What is the term for hacking a phone system?
Anonymous Quiz
8%
Telco-hacking
10%
Hacking
12%
Cracking
70%
Phreaking
What is the name for the hacking technique that involves using persuasion and deception to
get a person to provide information to help compromise security?
Anonymous Quiz
83%
A. Social engineering
0%
B. Conning
6%
C. Human intel
11%
D. Soft hacking