What security principle is based on the division of job responsibilities – designed to prevent fraud?
What security principle is based on the division of job responsibilities – designed to prevent fraud?
_____ is the authoritative entity which lists port assignments
_____ is the authoritative entity which lists port assignments
Cable modems are less secure than DSL connections because cable modems are shared with other subscribers?
Cable modems are less secure than DSL connections because cable modems are shared with other subscribers?
____________ is a file system that was poorly designed and has numerous security flaws.
____________ is a file system that was poorly designed and has numerous security flaws.
DES – Data Encryption standard has a 128 bit key and is very difficult to break.
DES – Data Encryption standard has a 128 bit key and is very difficult to break.
What is the main difference between computer abuse and computer crime?
What is the main difference between computer abuse and computer crime?
A standardized list of the most common security weaknesses and exploits is the __________.
A standardized list of the most common security weaknesses and exploits is the __________.
A salami attack refers to what type of activity?
A salami attack refers to what type of activity?
Multi-partite viruses perform which functions?
Multi-partite viruses perform which functions?