Which of the following is a security protocol that is used to protect data from being modified, corrupted, or accessed without authorization?
Which of the following protocols is used to secure workstation and computer authentication across the network?
Which of the following will he suggest his team members to do when a suspicious email that contains an embedded hyperlink is received from a customer?
Which of the following viruses infects Word 97 documents and the NORMAL.DOT file of Word 97 and Word 2000?
Which of the following steps can be taken by an administrator as countermeasures against software keyloggers?