CIPT Exam Question 1
Which of the following is considered a client-side IT risk?
CIPT Exam Question 2
Which is NOT a way to validate a person's identity?
CIPT Exam Question 3
Which of these actions is NOT generally part of the responsibility of an IT or software engineer?
CIPT Exam Question 4
Which of the following modes of interaction often target both people who personally know and are strangers to the attacker?
CIPT Exam Question 5
Which of the following techniques describes the use of encryption where encryption keys are divided into parts that can then be used to recover a full encryption key?