Question: QUESTION 10 Using SSL/TLS for Web applications is attractive because SSL/TLS ________. is essentially free to use offers the strongest possible cryptographic protections both is
QUESTION 10
Using SSL/TLS for Web applications is attractive because SSL/TLS ________.
| is essentially free to use | ||
| offers the strongest possible cryptographic protections | ||
| both is essentially free to use and offers the strongest possible cryptographic protections | ||
| neither is essentially free to use nor offers the strongest possible cryptographic protections |
0.75 points
QUESTION 11
Attack programs that can be remotely controlled by an attacker are ________.
| bots | ||
| sock puppets | ||
| both bots and sock puppets | ||
| neither bots nor sock puppets |
0.75 points
QUESTION 12
For sensitive assets, reusable passwords ________.
| should be especially long | ||
| should be difficult to remember | ||
| should contain a truly complex mixture of characters | ||
| should not be used |
0.75 points
QUESTION 13
Which of the following meets the definition of hacking?
| to intentionally use a computer resource without authorization | ||
| to intentionally use a computer on which you have an account but use it for unauthorized purposes | ||
| both to intentionally use a computer resource without authorization and to intentionally use a computer on which you have an account but use it for unauthorized purposes | ||
| neither to intentionally use a computer resource without authorization nor to intentionally use a computer on which you have an account but use it for unauthorized purposes |
0.75 points
QUESTION 14
Using bodily measurements for authentication is ________.
| illegal | ||
| biometrics | ||
| mandatory for good security | ||
| All of these |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
