Chapter 8 T/F

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A drive by download is a technique used by hackers to enable accessing files on a wireless network.

False

An acceptable use policy defines the acceptable level of access to information assets for different users.

False

DoS attacks are used to destroy information and access restricted areas of a company's information system.

False

High-availability computing is also referred to as a fault tolerance.

False

In a walk through, hackers are able to bypass security controls of a system with little opposition.

False

Packet filtering catches most types of network attacks.

False

A Trojan horse is a software program that appears to be benign but then does something other than expected.

True

Bio-metric authentication is the use of physical characteristics such as retinal images to provide identification.

True

Computer worms spread much more rapidly than computer viruses.

True

Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.

True

Mobile devices are not targeted as extensively by malware as traditional computers.

True

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

True

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

True

Public key encryption uses two keys.

True

SSL is a protocol used to establish a secure connection between two computers.

True

Sniffers enable hackers to steal proprietary information from anywhere on a network, including emails messages, company files, and confidential reports.

True

Unauthorized access is a security challenge that is most likely to occur in a network at the point of client computers.

True

Viruses can be spread through e-mail.

True

Wireless networks are vulnerable to penetration because raio frequency bands are easy to scan,

True

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

True


Set pelajaran terkait

Abdomen/Lower Limb/Etc: Lev Quiz

View Set

Champions School Home Inspection

View Set

Principles of Accounting Module 6

View Set

ATI Pharmacology Practice Set #4

View Set

Chapter 10: Intermolecular Forces- The Uniqueness of Water

View Set

CompTIA 220-902 Exam (121-130), CompTIA 220-902 Exam (111-120), CompTIA 220-902 Exam (101-110), CompTIA 220-902 Exam (91-100), CompTIA 220-902 Exam (81-90), CompTIA 220-902 Exam (71-80), CompTIA 220-902 Exam (61-70), CompTIA 220-902 Exam (51-60), Com...

View Set

DIDLS (Diction Imagery Detail Language Syntax)

View Set