The following actions have been noted as providing motivation to virus writers?
The following actions have been noted as providing motivation to virus writers? (Choose all that
apply)
Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic,
CORRECT TEXT
The ____________ protocol sends passwords in clear text, while ____________ encrypts
passwords. Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic,
Which of the following are used in Biometrics?
Which of the following are used in Biometrics?
which weak security mechanism?
Smart cards are a secure alternative to which weak security mechanism?
What type of software can be used to prevent, detect (and possibly correct) malicious activities on a system?
What type of software can be used to prevent, detect (and possibly correct) malicious activities on
a system?
Information security policies are a ___________________.
Information security policies are a ___________________.
Macintosh computers are not at risk for receiving viruses.
Macintosh computers are not at risk for receiving viruses.
CORRECT TEXT Unlike like viruses and worm, __________ are bogus messages that spread via email forwarding.
CORRECT TEXT
Unlike like viruses and worm, __________ are bogus messages that spread via email forwarding.
These types of controls deal with system auditing and usability.
There are 6 types of security control practices. ___________ controls are management policies,
procedures, and guidelines that usually effect the entire system. These types of controls deal with
system auditing and usability.
CORRECT TEXT Name two types of Intrusion Detection Systems ________ and ________.
CORRECT TEXT
Name two types of Intrusion Detection Systems ________ and ________.