In information security, what can constitute a loss?
A. theft of information
B. a delay in transmitting information that results in a financial penalty
C. the loss of good will or a reputation
D. all of the above
Answer: D
You might also like to view...
What must you do before adding a primitive type to a vector?
What will be an ideal response?
On a(n) ______ tablet, the case is positioned below a keyboard, attached by a hinge that enables the user to fold the display down over the keyboard.
A. convertible B. ultrathin C. collapsible D. all-in-one
A firewall technician has been instructed to disable all non-secure ports on a corporate firewall. The technician has blocked traffic on port 21, 69, 80, and 137-139. The technician has allowed traffic on ports 22 and 443. Which of the following correctly lists the protocols blocked and allowed?
A. Blocked: TFTP, HTTP, NetBIOS; Allowed: HTTPS, FTP B. Blocked: FTP, TFTP, HTTP, NetBIOS; Allowed: SFTP, SSH, SCP, HTTPS C. Blocked: SFTP, TFTP, HTTP, NetBIOS; Allowed: SSH, SCP, HTTPS D. Blocked: FTP, HTTP, HTTPS; Allowed: SFTP, SSH, SCP, NetBIOS
To cloak a particular file type, you should open the Site Definition dialog box, click the Cloaking category, click the Cloak files ending with check box, and then type a file extension in the text box below the check box.
Answer the following statement true (T) or false (F)