Proprietary information for your company’s online business was released to a competitor. Which of the following preventative measures should your company take to ensure that its proprietary information is protected in the future?
You are configuring an e-mail client to connect to your e-mail account. Which of following is required to set up the e-mail account?
You are using an e-mail client that you are unfamiliar with. You need to send an e-mail with an attachment but you do not see a feature labeled “attachment” anywhere on the client. What icon should you look for that is commonly used to invoke the e-mail attachment option?
C A. Lock
B. Folder
C. Checkmark
D. Paperclip
You have just checked the balance in your bank account by logging into your bank’s Web site. Which protocol was most likely used for the transmission of your information?