ds ch 7, ch 8 T

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A Trojan horse is a software program that appears to be benign but then does something other than expected.

t

Biometric authentication is the use of physical characteristics such as retinal images to provide identification.

t

Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.

t

Computer worms spread much more rapidly than computer viruses.

t

Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.

t

Fiber-optic cable is more expensive and harder to install than wire media.

t

In a client/server network, a network server provides every connected client with an address so it can be found by others on the network.

t

In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.

t

Mobile devices are not targeted as extensively by malware as traditional computer

t

Mobile search makes up 20% of all Internet searches.

t

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

t

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

t

Public key encryption uses two keys.

t

SSL is a protocol used to establish a secure connection between two computers.

t

Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.

t

Telephone networks are fundamentally different from computer networks.

t

Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.

t

Unauthorized access is a security challenge that is most likely to occur in a network at the point of client computers.

t

Viruses can be spread through e-mail.

t

VoIP technology delivers voice information in digital form using packet switching.

t

Web 3.0 is an effort to add a layer of meaning to the existing Web in order to reduce the amount of human involvement in searching for and processing Web information.

t

Wikis allow visitors to change or add to the original posted material.

t

Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.

t

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

t


Set pelajaran terkait

Macro Test 3 Multiple Choice Practice

View Set

цифры(деньги,математика,даты,тел номер, счёт больше 60)

View Set

Atomic Structure And Interactions Review.

View Set

C9: Reporting and Analyzing Current Liabilities

View Set

AI CH2 - Agents and Environments

View Set