Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Involves recovering passwords from data that has been stored in or transmitted by a computer system refers to. Select one: a. cracking b. Encryption c.

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

Involves recovering passwords from data that has been stored in or transmitted by a computer system refers to. Select one: a. cracking b. Encryption c. protection d. hacking In ............ Network, every device has exactly two neighborin surpose Select one: a. ring b. star c. mes d. bus The best transmission media for receiving a TV signal. Select one: a. Microwave b. Fiber Optic Cable c. UTP Cable with Repeater. d. Coaxial Cable Which of the following is considered as the unsolicited commercial email? Select one: a. Trojan b. Malware c. virus d. spam Firewalls are used to protect against Select one: a. data driven attacks b. unauthorised access c. virus attacks attacks One of the following not a Spyware characteristic: Select one: a. Designed to record personal information. b. Thief can become the victim. c. Hides from users. d. Typically, undesired software. In the case of comparing the BUS network with the STAR network, we conclude: Select one: a. STAR is less expensive than BUS b. BUS is less expensive than STAR c. BUS is more expensive than STAR d. All answers are incorrect One of the following not a Spyware characteristic: Select one: a. Designed to record personal information. b. Thief can become the victim. c. Hides from users. d. Typically, undesired software. Networks are monitored by security personnel and supervised by who set(s) up accounts and passwords for authorized network users. Select one: a. Password administrators b. IT Managers c. Network administrators Convertinn nentartad data hack intn its nrininal f The best transmission media for connecting two campuses : Select one: a. Microwave b. Coaxial Cable c. UTP Cable with Repeater. d. Fiber Optic Cable Which type of the following malware does not replicate or clone them self's through ?infection a. Rootkits b. Trojans c. Avira d. Worms The best transmission media for connecting two campuses: Select one: a. Coaxial Cable b. UTP Cable with Repeater. c. Fiber Optic Cable d. Microwave Firewalls are used to protect against Select one: a. virus attacks b. data driven attacks c. fire attacks d. unauthorised access The best transmission media for connecting a 20 pc's in a lab. Select one: a. Microwave b. UTP Cable with Repeater. c. Bluetooth d. Coaxial Cable In order to ensure the security of the data/ information, we need to the :data a. Decrypt b. Scan c. Encrypt d. Delete

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

What is database?

Answered: 1 week ago

Question

What are Mergers ?

Answered: 1 week ago

Question

Distinguish between filtering and interpreting. (Objective 2)

Answered: 1 week ago