Describe two examples of vulnerabilities of automobiles for which auto manufacturers have instituted controls. Tell whether you think these controls are effective, somewhat effective, or ineffective
What will be an ideal response?
(1)
Vulnerability:
Someone
drives
your
car
away
without
your
permission.
Control:
Ignition
switch
lock.
Effectiveness:
Somewhat
effective
because
it
deters
casual
theft,
but
the
knowledgeable
thief
can
"hot
wire"
the
engine,
bypassing
the
ignition
switch.
(2)
Vulnerability:
Someone
who
does
not
realize
your
car
has
stopped
crashes
into
the
back
of
your
car.
Control:
Brake
lights.
Effectiveness:
Reasonably
good.
Note
the
redundancy
of
the
system:
with
two
brake
lights,
even
if
one
fails,
the
second
one
warns
other
drivers.
You might also like to view...
Cascading Style Sheets (CSS), the style sheet language developed for use with HTML on the Web, also can be used with the elements in any XML document.
Answer the following statement true (T) or false (F)
What is "Fill From History" and how does it work? Give one example of how you might use the History panel in this way.
What will be an ideal response?
Of the three levels of Windows updates, which does Microsoft recommend you do NOT do?
A) only download updates B) install updates automatically C) only download updates but let you install them D) never check for updates
An administrator needs to install a centrally located firewall that needs to block specific incoming and outgoing IP addresses, without denying legitimate return traffic. Which of the following firewall types should the administrator install?
A. A host- based firewall B. A network-based firewall C. A host-based stateful firewall D. A stateless network-based firewall.