Which of the following is NOT a standard practice for protecting computer systems?
A) use wireless LAN connections without encryption
B) use antivirus and antimalware software and their automatic update features
C) use firewall software to intercept threats
D) update applications such as Microsoft Office products regularly
A
You might also like to view...
What is a limitation of dynamic NAT?
A) It operates only with dynamic routing protocols. B) It does not work with VPNs. C) The NAT pool can become exhausted. D) It does not support static translation.
What do you do if a user describes a problem and suggests a solution that you know for a fact is not correct?
A) Humor the person and prove the solution is wrong. B) Take a different course of action, but thank the person for the suggestion. C) Take a moment to teach the person the technical information that shows why the person's solution is wrong. D) Don't mention the person's solution and just troubleshoot the problem.
How does the IT security professional ensure the continuous effectiveness of the personnel security program?
What will be an ideal response?
The DNS namespace is divided into units called ____________________ that describe portions of a domain.
Fill in the blank(s) with the appropriate word(s).