________ refers to the ability to verify a system's or a persons identity.
What is Authentication
PPTP
What is Point-to-Point Tunneling Protocol
Inserting into a legitimate Web page links that lead to fake forms or downloads for malware
What is Clickjacking
Hypertext Transfer Protocol
What is HTTP
Best describes data.
What are Facts and figures and
Collection of recordings
The following are included in CLM
What is VPN client, VPN server, Transmission media
Software designed to damage or disrupt the operation of a system
What is Malware
Internet Protocol Security
What is IPSec
BBS
What is Bulletin Board System
"Contact us" forms are an example of what?
What is limited two-way communication
Refers to an attack whereby all the files and folders on a computer system are encrypted and held for ransom
What is Ransomeware
Virtual private network
What is VPN
A method for moving data over a network.
What is Packet Switching
Protocol that is used by HTTPS for encrypting data between client and host
What is SSL
E-commerce scams
What is a mimic site
Simple Mail Transfer Protocol
What is SMTP
An early computer network that featured searches through a file tree
What is Gopher
Currency that you purchase with a credit, charge, or debit card and download to your computer or smart card
What is Electronic cash
An attack in which the attacker pretends to be someone else to gain the trust necessary to get personal information
What is Pretexting
Software as a Service
What is SaaS