Reviewing log files is a time-consuming task and therefore should only be done when an attack on the network has occurred.

Answer the following statement true (T) or false (F)


False

Computer Science & Information Technology

You might also like to view...

The software interface (such as LPT1) between the computer and the print device is the _________

a. Printer port b. Print queue c. Print driver d. Spooler

Computer Science & Information Technology

A(n) ____________________ is a person or company with whom you communicate.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

?Match each item with a statement below.

A. resolves IP address to MAC address B. type of address that is automatically assigned when no DHCP server can be contacted C. the unit of information used by UDP in the Transport layer D. resolves computer names to IP addresses E. dynamically configures IP address F. protocol in which only e-mail headers are downloaded to the host until the message is opened G. an extension to IP working at the Internetwork layer that provides security by using authentication and encryption H. protocol in which e-mail is downloaded to the host computer I. Transport layer protocol that is connection-oriented and reliable J. Transport layer protocol that is connectionless

Computer Science & Information Technology

_____ measures risk likelihood and impact.

A. Risk assessment B. Risk marking C. Risk identification D. Risk control

Computer Science & Information Technology