Answer the following statements true (T) or false (F)
1. Hardware is the most vulnerable to attack and the least susceptible to
automated controls.
2. Contingency planning is a functional area that primarily requires
computer security technical measures.
3. X.800 architecture was developed as an international standard and
focuses on security in the context of networks and communications.
4. The first step in devising security services and mechanisms is to
develop a security policy.
5. Assurance is the process of examining a computer product or system
with respect to certain criteria.
1. True
2. False
3. True
4. True
5. False
You might also like to view...
Desktop apps can be run from either the ________ screen or the desktop
A) lock B) Start C) Tile D) Group
Match the following bezel gestures with their results
I. Right bezel II. Left bezel III. Top bezel IV. Slow left bezel V. Left bezel and then back to left bezel again A. Brings up a menu of all open apps B. Opens the charms menu C. Switches to the last app that was used D. Brings up additional menus depending on the currently open app E. When multiple apps are open, snaps the current app to a docked position
When the sum of the data arriving over all virtual circuits exceeds the access rate, the situation is called ____.
A. undersubscription B. oversubscription C. overrate D. underrate
To close a window in Windows 10, you can _____. Select all that apply.
A. right-click its button on the taskbar, then click Close window B. click the Close button in the upper-right corner of the window C. click the Close button in the window's thumbnail on the taskbar D. click the Start button and click the program name or icon