Answer the following statements true (T) or false (F)

1) The security of modern cryptosystems lies in the secrecy of the algorithm.
2) Increasing the security of a network often decreases its functionality and efficiency.
3) Firewalls are the single most effective way to add security to a small computer network.
4) Kerberos is an authentication protocol that is used over TCP/IP networks.
5) SSL can connect a network of computers over the Internet.


1) F
2) T
3) T
4) T
5) F

Computer Science & Information Technology

You might also like to view...

The ____________________ encoding method also known as Delay encoding, is a bi-phase encoding method that uses only half of the bandwidth of the other bi-phase method but has all of their advantages.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Match the following terms to their meanings:

I. Update query II. Parameter query III. Action query IV. Delete query A. enables you to create a new table or change data in an existing table B. used to add, change, or delete data in fields of one or more existing records C. removes records from an existing table in the same database D. prompts you for criteria before running the query

Computer Science & Information Technology

Elements are added at one end of the queue, called the ____ or rear.

A. back B. head C. top D. middle

Computer Science & Information Technology

Suppose you tried to explain the concept of throwaway prototyping to a manager, and she responded by asking, “So, is throwaway prototyping a waste of time and money?” How would you reply?

What will be an ideal response?

Computer Science & Information Technology