Which access control threat uses programs or devices that examine traffic on the enterprise network?
A) Network sniffers
B) Phishing
C) Identify theft
D) Spoofing at log-on
Answer: A
You might also like to view...
Which of the following is the best example of an employee who was fired for good cause?
A. Nguyen refused to falsely testify in court about an accident at his employer's factory so he was fired. B. Nguyen refused to work during college basketball season (approximately five months) so he was fired. C. Nguyen gave a Starbucks gift card to his boss who was allergic to coffee (Nguyen didn't know) so he was fired. D. Nguyen was promised a "lifetime job" with the company but he died suddenly so he was fired.
If the training was designed to teach trainees how to use the new forms that were developed by Human Resources, you can expect to measure this transfer of training
A) In about 6 months. B) In about 3 weeks. C) It is not necessary if learning was indicated to have occurred. D) A few days after training.