Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

QUESTION 15 Fingerprint recognition is generally acceptable for ________. laptop

ID: 3744945 • Letter: Q

Question

QUESTION 15

Fingerprint recognition is generally acceptable for ________.

laptops

corporate databases

resources involving private information about customers

All of these

0.75 points   

QUESTION 16

Users typically can eliminate a vulnerability in one of their programs by ________.

installing a patch

using an antivirus program

both installing a patch and using an antivirus program

neither installing a patch nor using an antivirus program

0.75 points   

QUESTION 17

________ look at ________, while ________ mostly look at ________.

Antivirus programs; files; firewalls; files

Antivirus programs; files; firewalls; packets

Antivirus programs; packets; firewalls; files

Antivirus programs; packets; firewalls; packets

0.75 points   

QUESTION 18

Cyberwar attacks are made by ________.

major cybercriminal gangs

national governments

both major cybercriminal gangs and national governments

neither major cybercriminal gangs nor national governments

0.75 points   

QUESTION 19

________ are full programs.

Viruses

Worms

both Viruses and Worms

neither Viruses nor Worms

0.75 points   

QUESTION 20

Stateful packet inspection firewalls are attractive because of their ________.

low cost for a given traffic volume

ability to base rules on specific application programs

both low cost for a given traffic volume and ability to base rules on specific application programs

neither low cost for a given traffic volume nor ability to base rules on specific application programs

laptops

corporate databases

resources involving private information about customers

All of these

Explanation / Answer

15. All of these
All the system and application that contain very sensitive information have fingerprint recognition for allowing only the particular person to access the data
16. both installing a patch and using an antivirus program
If the operating system or the antivirus program has new developments which helps in restricting the antivirus then installing the patch is good. Of course, an antivirus helps in eliminating the vulnerability.
17. Antivirus programs; files; firewalls; packets
Antivirus programs scans each and every file present in the system, whereas the firewalls scan whether the packets coming in have required access.
18. both major cybercriminal gangs and national governments
Some hackers do cyber attacks to gain money and data in easy way. The national government do cyber attacks on other countries to know about them and also hinder their growth.
19. Viruses
Virus are full progams. They replicate by using other programs. But worms need help of other programs to infest.
20.both low cost for a given traffic volume and ability to base rules on specific application programs
Stateful inspection checks the state of connections and gives status to determine which network packets to allow.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote