Which of the following refers to the tactic of keeping security holes, encryption algorithms, and processes secret in an effort to confuse attackers?
a. Authorization control
b. Secure socket layer
c. Security through obscurity
d. Biometrics
c
FEEDBACK: a. Incorrect.
b. Incorrect.
c. Correct.
d. Incorrect.
You might also like to view...
Increasing profits will most likely occur at which stage of the PLC?
A) introduction B) maturity C) growth D) decline E) product development
An assignment is best described as a transfer of
a. an obligation. b. a right. c. a personal responsibility. d. all of these.
How does the author suggest that the Internet’s legal resources be used?
a. to access low-cost legal forms and advice b. to identify the type of legal counsel you will need c. to seek advice from free legal services d. to find sample documents that match your industry, products, and services
In many states, the plaintiff's negligence is a defense that may be raised in a negligence suit.
Answer the following statement true (T) or false (F)