Which of the following is NOT listed in the text as a "best practice" of security in the computer industry, as recommended by the Institute for Security Technology Studies at Dartmouth College?
a. Biometric access requirements
b. Update software
c. Maintain firewalls
d. Scan for viruses and use virus protection
a
You might also like to view...
The IACP recommends police secure a(n) ________ before launching drones for investigative purposes
Fill in the blank(s) with correct word
What is a type of usurious loan that requires a specified schedule of repayment, including both principal and interest?
A) ?knockdown B) ?vig C) ?principle D) ?chop
Section 498–A of the Indian Penal Code deals with illegal cruel conduct against women. Which of the following is a type of this conduct?
a. Conduct that is likely to drive a woman to suicide b. Conduct that is likely to cause grave injury to the life, limb, or health of the woman c. Harassment with the purpose of forcing the woman or her relatives to give some property d. All of the above
According to the text, although myths about rape are changing, college students continue to hold myths about ________ rape
A) acquaintance B) marital C) homosexual D) statutory