Question: True/False Indicate whether the statement is true or false. ____ 1. Threats that are deemed low risk and unlikely to occur can be ignored when

True/False Indicate whether the statement is true or false. ____ 1. Threats that are deemed low risk and unlikely to occur can be ignored when the cost to protect against the threat exceeds the value of the protected asset. ____ 2. Necessity refers to preventing data delays or denials (removal) within the context of computer security. ____ 3. Absolute security is relatively easy to achieve. ____ 4. The most complete way for Web site visitors to protect themselves from revealing private information or being tracked by cookies is to disable cookies entirely. ____ 5. Active content is launched in a Web browser automatically when that browser loads a Web page containing active content. ____ 6. Developers use active content because it extends the functionality of HTML and moves some data processing chores from the busy server machine to the users client computer. ____ 7. JavaScript and VBScript are examples of active content forms. ____ 8. When Java applets are run within the constraints of the sandbox, they have full access to the client system. ____ 9. Zombie attacks can be traced back to their creators very easily. ____ 10. Java is a programming language used widely in Web pages to provide active content. ____ 11. When a Windows-based Web browser downloads a Web page containing an embedded ActiveX control, the control is executed on the client computer. ____ 12. JavaScript programs, like Java applets, operate under the restrictions of the Java sandbox security model. ____ 13. Worms can spread quickly through the Internet. ____ 14. A digital certificate for software can attest to the quality of the software. ____ 15. Digital certificates never expire. ____ 16. One significant threat to electronic commerce is the theft of sensitive or personal information. ____ 17. Any message traveling on the Internet is subject to secrecy, integrity, and necessity threats. ____ 18. Secrecy protection is a legal matter. ____ 19. E-mail secrecy issues address whether company supervisors should be permitted to read employees messages randomly. ____ 20. A computer that has experienced a necessity threat slows processing to an intolerably slow speed.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!