Chapter 8 11-20

Ace your homework & exams now with Quizwiz!

An acceptable use policy defines the acceptable level of access to information assets for different users

False

Over 70 percent of malware today is aimed at small businesses

False

Packet filtering catches most types of network attacks

False

Smartphones typically feature state-of-the art encryption and security features, making them highly secure tools for businesses

False

The disturbed nature of cloud computing makes it somewhat easier to track unauthorized access

False

Biometric authentication is the use of physical characteristics such as retinal images to provide identification

True

NAT conceals the IP addresses of the organization's internal host computer to deter sniffer programs

True

Public key encryption uses two keys

True

SSL is a protocol used to establish a secure connection between two computers

True

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousand of years

True


Related study sets

Hemoglobin A1c: Glycated Hemoglobin (GHb)

View Set

Chapter 2 - Growth and Development

View Set

Life Policies - Section 5 - Quiz

View Set

Nursing Knowledge 1000-Module 7 Cognition

View Set