Login
Remember me
Register
Getvoice.org
Questions
Unanswered
Tags
Users
Ask a Question
Ask a Question
Recent questions and answers in Technology
2
answers
Which of the following is an example of Near Field Communication?
answered
Oct 16, 2022
in
Technology
by
admic
(
973k
points)
technology
technology-quiz
near-field
communication
2
answers
Which of the following is a security best practice when using social networking sites?
answered
Oct 8, 2022
in
Technology
by
admic
(
973k
points)
technology
technology-quiz
security
social-network
website
1
answer
Which one of these is not an official development name for a Ubuntu release?
answered
Jun 14, 2022
in
Technology
by
kk3575515
(
735k
points)
technology
technology-quiz
trusty-tahr
mystic-mansion
wily-werewolf
utopic-unicorn
1
answer
In which country's version of Half-Life are the HECU Marines replaced with robots?
answered
Jun 14, 2022
in
Technology
by
kk3575515
(
735k
points)
technology
technology-quiz
france
china
germany
japan
hecu
robot
1
answer
Which of the following is NOT included in a breach notification?
answered
Jan 10, 2022
in
Technology
by
admic
(
973k
points)
technology
technology-quiz
breach
notification
discovery
information
encrypted
reporting
1
answer
Which of the following information is a security risk when posted publicly on your social networking profile?
answered
Jan 10, 2022
in
Technology
by
admic
(
973k
points)
technology
technology-quiz
security
social-network
profile
security-risk
birthday
email
1
answer
Which of the following is required to access classified information?
answered
Jan 10, 2022
in
Technology
by
admic
(
973k
points)
technology
technology-quiz
data
classified
unauthorized-access
information
1
answer
Which of the following is true of protecting classified data?
answered
Jan 10, 2022
in
Technology
by
admic
(
973k
points)
technology
technology-quiz
data
classified
true-statement
1
answer
Which of the following best describes the sources that contribute to your online identity?
answered
Jan 10, 2022
in
Technology
by
admic
(
973k
points)
technology
technology-quiz
software
paas
online
online-identity
resource
1
answer
Which of the following is NOT a way that malicious code spreads?
answered
Jan 10, 2022
in
Technology
by
admic
(
973k
points)
technology
technology-quiz
cyber
cyber-security
code
malicious-code
1
answer
Which of the following does NOT constitute spillage?
answered
Jan 10, 2022
in
Technology
by
admic
(
973k
points)
technology
technology-quiz
spillage
constitute
cyber
security
1
answer
Which of the following statements about the HIPAA Security Rule are true?
answered
Jan 6, 2022
in
Technology
by
admic
(
973k
points)
technology
technology-quiz
security
hipaa
phi
safeguard
business
administrative-incharge
1
answer
Which of the following are breach prevention best practices?
answered
Jan 6, 2022
in
Technology
by
admic
(
973k
points)
technology
technology-quiz
security
breach
workstation
phi
logoff
1
answer
Which of the following are examples of personally identifiable information (PII)?
answered
Jan 6, 2022
in
Technology
by
admic
(
973k
points)
technology
technology-quiz
pii
information
telephone
home-address
social-security
1
answer
Which of the following are common causes of breaches?
answered
Jan 6, 2022
in
Technology
by
admic
(
973k
points)
technology
technology-quiz
security
breach
human-error
unauthorized-access
media
1
answer
Which of the following best describes the platform as a service (PaaS) cloud computing service model?
answered
Dec 25, 2021
in
Technology
by
admic
(
973k
points)
technology
technology-quiz
paas
cloud-computing
software
internet
storage
infrastructure
1
answer
Which of the following has Jennifer Taylor NOT voiced?
answered
Dec 6, 2021
in
Technology
by
admic
(
973k
points)
technology
technology-quiz
voice
jennifer-taylor
cortana
princess-peach
sarah-kerrigan
zoey
1
answer
Which of the following connectors is used with Ethernet 100BaseT networks?
answered
May 3, 2021
in
Technology
by
admic
(
973k
points)
technology
connectors
ethernet-100baset
network
rj45
1
answer
Which of the following provides Security for Wireless Networks?
answered
Apr 23, 2021
in
Technology
by
voice
(
257k
points)
security-for-wireless-networks
csma-cd
wpa
wap
wireless-networks
Help get things started by
asking a question
.
...