Unwanted or junk e-mail is called ________
A) spyware B) adware C) malware D) spam
D
Computer Science & Information Technology
You might also like to view...
Which of the following Microsoft Office applications is used to create dynamic presentations to inform and persuade audiences?
A) PowerPoint B) Word C) Photoshop D) Access
Computer Science & Information Technology
A company has several public conference room areas with exposed network outlets. In the past, unauthorized visitors and vendors have used the outlets for internet access. The help desk manager does not want the outlets to be disabled due to the number of training sessions in the conference room and the amount of time it takes to get the ports either patched in or enabled. Which of the following is the best option for meeting this goal?
A. Flood guards B. Port security C. 802.1x D. Loop protection E. IPSec
Computer Science & Information Technology