_____ is the authoritative entity which lists port assignments
_____ is the authoritative entity which lists port assignments
Cable modems are less secure than DSL connections because cable modems are shared with other subscribers?
Cable modems are less secure than DSL connections because cable modems are shared with other subscribers?
____________ is a file system that was poorly designed and has numerous security flaws.
____________ is a file system that was poorly designed and has numerous security flaws.
HTTP, FTP, SMTP reside at which layer of the OSI model?
HTTP, FTP, SMTP reside at which layer of the OSI model?
DES – Data Encryption standard has a 128 bit key and is very difficult to break.
DES – Data Encryption standard has a 128 bit key and is very difficult to break.
What is the main difference between computer abuse and computer crime?
What is the main difference between computer abuse and computer crime?
A standardized list of the most common security weaknesses and exploits is the __________.
A standardized list of the most common security weaknesses and exploits is the __________.
A salami attack refers to what type of activity?
A salami attack refers to what type of activity?
Multi-partite viruses perform which functions?
Multi-partite viruses perform which functions?