Question: 34. An antivirus program claims that computer is not infected and free from viruses You scan with two other antivinus software and they both find
34. An antivirus program claims that computer is not infected and free from viruses You scan with two other antivinus software and they both find the Mydoom worm. The assessment by the firsg antivirus program can be an example of 3a whkhdescription below is gerest for A Risk is a combination of theea Threats are weaknesses in software and 8. C Vulnerabilities are extemal D. operating systems A Fabe Negative False Positive C. True Negative D. True Positive harm our networks agents to We can have risks even though there are no vulnerabilities 31. Cleaning your desk of sensitive documentation before leaving and background checks are examples of A Physical controls 35. Trying selected words from a list to find a password is called: A. Dictionary attack B. Violent attack C. Brute-force attack D. Sequential attack C Visionary controls D. Administrative controls 32. Which of the following terms best describes ensuring that data is accessible to authorized users when needed? 36. ,scandal in A Integrity B. Accounting C. Availablity D. BYOD 2017 is an example of a massive security breach which impacted almost half of US population A. Equifax 8. Enron C. E-Corp D. TJ.Maxox 33. Which one below is nos one of the phases of incident response process? A. Preparation B. Detection C Quarantine D. Post-Incident Activity
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
