We've detected that Javascript is not enabled. It is required for an optimal survey taking experience. Please check your browser's settings and make sure Javascript is turned on. Learn how to enable Javascript.
4. Which of the following best describes shoulder surfing?
5. A hacker finds a system that has a poorly design and unpatched program installed. He wants to create a backdoor for himself. Which of the following tools could he use to establish a backdoor?
9. Which of the following encryption tools would prevent a user from reading a file that they did not create and does not require you to encrypt an entire drive?