Question: QUESTION 15 Fingerprint recognition is generally acceptable for ________. laptops corporate databases resources involving private information about customers All of these 0.75 points QUESTION 16

QUESTION 15

Fingerprint recognition is generally acceptable for ________.

laptops

corporate databases

resources involving private information about customers

All of these

0.75 points

QUESTION 16

Users typically can eliminate a vulnerability in one of their programs by ________.

installing a patch

using an antivirus program

both installing a patch and using an antivirus program

neither installing a patch nor using an antivirus program

0.75 points

QUESTION 17

________ look at ________, while ________ mostly look at ________.

Antivirus programs; files; firewalls; files

Antivirus programs; files; firewalls; packets

Antivirus programs; packets; firewalls; files

Antivirus programs; packets; firewalls; packets

0.75 points

QUESTION 18

Cyberwar attacks are made by ________.

major cybercriminal gangs

national governments

both major cybercriminal gangs and national governments

neither major cybercriminal gangs nor national governments

0.75 points

QUESTION 19

________ are full programs.

Viruses

Worms

both Viruses and Worms

neither Viruses nor Worms

0.75 points

QUESTION 20

Stateful packet inspection firewalls are attractive because of their ________.

low cost for a given traffic volume

ability to base rules on specific application programs

both low cost for a given traffic volume and ability to base rules on specific application programs

neither low cost for a given traffic volume nor ability to base rules on specific application programs

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!