QUESTION 15 Fingerprint recognition is generally acceptable for ________. laptop
ID: 3744945 • Letter: Q
Question
QUESTION 15
Fingerprint recognition is generally acceptable for ________.
laptops
corporate databases
resources involving private information about customers
All of these
0.75 points
QUESTION 16
Users typically can eliminate a vulnerability in one of their programs by ________.
installing a patch
using an antivirus program
both installing a patch and using an antivirus program
neither installing a patch nor using an antivirus program
0.75 points
QUESTION 17
________ look at ________, while ________ mostly look at ________.
Antivirus programs; files; firewalls; files
Antivirus programs; files; firewalls; packets
Antivirus programs; packets; firewalls; files
Antivirus programs; packets; firewalls; packets
0.75 points
QUESTION 18
Cyberwar attacks are made by ________.
major cybercriminal gangs
national governments
both major cybercriminal gangs and national governments
neither major cybercriminal gangs nor national governments
0.75 points
QUESTION 19
________ are full programs.
Viruses
Worms
both Viruses and Worms
neither Viruses nor Worms
0.75 points
QUESTION 20
Stateful packet inspection firewalls are attractive because of their ________.
low cost for a given traffic volume
ability to base rules on specific application programs
both low cost for a given traffic volume and ability to base rules on specific application programs
neither low cost for a given traffic volume nor ability to base rules on specific application programs
laptops
corporate databases
resources involving private information about customers
All of these
Explanation / Answer
15. All of these
All the system and application that contain very sensitive information have fingerprint recognition for allowing only the particular person to access the data
16. both installing a patch and using an antivirus program
If the operating system or the antivirus program has new developments which helps in restricting the antivirus then installing the patch is good. Of course, an antivirus helps in eliminating the vulnerability.
17. Antivirus programs; files; firewalls; packets
Antivirus programs scans each and every file present in the system, whereas the firewalls scan whether the packets coming in have required access.
18. both major cybercriminal gangs and national governments
Some hackers do cyber attacks to gain money and data in easy way. The national government do cyber attacks on other countries to know about them and also hinder their growth.
19. Viruses
Virus are full progams. They replicate by using other programs. But worms need help of other programs to infest.
20.both low cost for a given traffic volume and ability to base rules on specific application programs
Stateful inspection checks the state of connections and gives status to determine which network packets to allow.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.