Explain how peripherals should be treated, in terms of security risks.

What will be an ideal response?


Traditionally, peripherals have not been considered to be a security issue, but due to the increasing complexity and use of the devices, along with their increased storage capacity, more "intelligent" processors to deliver advanced functionality, and increased pervasiveness into the network, users and administrators should be aware of potential security configuration issues and risks.

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. C++ is a low-level language. 2. Main memory holds its data if the computer is turned off 3. An algorithm is always written in C++ 4. There are 8 bytes in one bit. 5. The printer is an example of an input device.

Computer Science & Information Technology

Keyword ___________ is used to create a synonym for a previously defined data type.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In a full outer join, all rows from both tables will be included regardless of whether they match rows from the other table.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

After performing a port scan, Sara, a network administrator, observes that port 443 is open. Which of the following services is MOST likely running?

A. SSL B. FTP C. TELNET D. SSH

Computer Science & Information Technology