Match each item with a statement below:
?
A. documents used in encryption and authentication protocols that identify a person or computer and can be verified by a certification authority
B. spreads by replicating itself into programs or documents
C. monopolizes network services or network bandwidth
D. inspects packets as they go into and out of the network
E. a series of letters, numbers, and special characters, much like a password, that both communicating devices use to authenticate each other's identity
F. time-dependent malware that can come in different forms. Its main characteristic is that it's activated when a particular event occurs
G. a self-contained, self-replicating program
H. packets are denied on context as well as packet properties
I. used to discover breaches in security
J. permits access to computer, bypasses normal authentication
A. digital certificates
B. virus
C. denial-of-service
D. firewall
E. preshared key
F. logic bomb
G. worm
H. stateful packet inspection
I. IDS
J. backdoor
You might also like to view...
The Math class is a part of the ____ package, so it need not be imported using the import statement.
A. java.util B. java.lang C. java.awt D. javax.swing
A virus program is a series of unique bytes that uniquely identifies a virus and distinguishes it from legitimate files on your PC.
Answer the following statement true (T) or false (F)
Declaring a class with all the data and functions public violates which principle(s) of object-oriented programming?
What will be an ideal response?
Each file has a unique filename referred to as the file's ____.
A. extension B. type C. internal name D. external name