Chapter 8 11-20
An acceptable use policy defines the acceptable level of access to information assets for different users
False
Over 70 percent of malware today is aimed at small businesses
False
Packet filtering catches most types of network attacks
False
Smartphones typically feature state-of-the art encryption and security features, making them highly secure tools for businesses
False
The disturbed nature of cloud computing makes it somewhat easier to track unauthorized access
False
Biometric authentication is the use of physical characteristics such as retinal images to provide identification
True
NAT conceals the IP addresses of the organization's internal host computer to deter sniffer programs
True
Public key encryption uses two keys
True
SSL is a protocol used to establish a secure connection between two computers
True
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousand of years
True