Question: QUESTION 15 Fingerprint recognition is generally acceptable for ________. laptops corporate databases resources involving private information about customers All of these 0.75 points QUESTION 16
QUESTION 15
Fingerprint recognition is generally acceptable for ________.
| laptops | ||
| corporate databases | ||
| resources involving private information about customers | ||
| All of these |
0.75 points
QUESTION 16
Users typically can eliminate a vulnerability in one of their programs by ________.
| installing a patch | ||
| using an antivirus program | ||
| both installing a patch and using an antivirus program | ||
| neither installing a patch nor using an antivirus program |
0.75 points
QUESTION 17
________ look at ________, while ________ mostly look at ________.
| Antivirus programs; files; firewalls; files | ||
| Antivirus programs; files; firewalls; packets | ||
| Antivirus programs; packets; firewalls; files | ||
| Antivirus programs; packets; firewalls; packets |
0.75 points
QUESTION 18
Cyberwar attacks are made by ________.
| major cybercriminal gangs | ||
| national governments | ||
| both major cybercriminal gangs and national governments | ||
| neither major cybercriminal gangs nor national governments |
0.75 points
QUESTION 19
________ are full programs.
| Viruses | ||
| Worms | ||
| both Viruses and Worms | ||
| neither Viruses nor Worms |
0.75 points
QUESTION 20
Stateful packet inspection firewalls are attractive because of their ________.
| low cost for a given traffic volume | ||
| ability to base rules on specific application programs | ||
| both low cost for a given traffic volume and ability to base rules on specific application programs | ||
| neither low cost for a given traffic volume nor ability to base rules on specific application programs |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
