Quiz 5 Computer Security

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which practice is NOT considered unethical under RFC 1087 issued by the Internet Architecture Board (IAB)?

Enforcing the integrity of computer-based information

Households are small communities making them a large threat to security.

F

Using GPU's over CPU's for password cracking is only done when a CPU is below Celeron.

F

Mandatory vacations minimize risk by rotating employees among various systems or duties.

False

Bob is preparing to dispose of magnetic media and wishes to destroy the data stored on it. Which method is NOT a good approach for destroying data?

Formatting

Which agreement type is typically less formal than other agreements and expresses areas of common interest?

Memorandum of understanding (MOU)

One advantage of using a security management firm for security monitoring is that it has a high level of expertise.

T

Policies that cover data management should cover transitions throughout the data life cycle.

T

Standards are used when an organization has selected a solution to fulfill a policy goal.

T

When an attacker is attacking a password system, the average attack space estimates the number of guesses required before success is likely.

T


संबंधित स्टडी सेट्स

HURM 4650 Compensation Exam 2 Ch 7,8,9,10

View Set

Micro Economics Morey second midterm

View Set

Pharmacology Prep U Chapter 8 Anti-Infective Agents

View Set

Chapter 5 Introduction to Anatomy & Physiology T or F.

View Set

MID TERM BUSINESS PRINCIPLES Chapter 4

View Set