31) The WEP specification calls for an access point and its users to share the same 40-bit encrypted password. 32) Viruses can be spread through e-mail. 33) Computer worms spread much more rapidly...





31) The WEP specification calls for an access point and its users to share the same 40-bit encrypted password.



32) Viruses can be spread through e-mail.



33) Computer worms spread much more rapidly than computer viruses.



34) One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.



35) Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.



36) DoS attacks are used to destroy information and access restricted areas of a company's information system.



37) Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.



38) An acceptable use policy defines the acceptable level of access to information assets for different users.



39) Biometric authentication is the use of physical characteristics such as retinal images to provide identification.



40) Packet filtering catches most types of network attacks.





May 15, 2022
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here