Most attacks can be classified as one of three broad classes. Which of the following is not one of these classes?

A) Viruses
B) Malware
C) Blocking
D) Intrusion


A) Viruses

Computer Science & Information Technology

You might also like to view...

An array called carList contains elements of struct type car which has components model, year and price. Which of the following will reference the year of the third car?

a) carList[2].car.year b) car[2].year c) carList.year[2] d) carList[2].year

Computer Science & Information Technology

Layer 2 Tunneling Protocol provides both authentication and data encryption for the VPN client and remote access server.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

As public-key cryptography is computationally intensive and drains the battery of Barack's device, he comes up with an alternative approach. First, he shares a secret key k with Hillary but not with Bill. Next, together with a joke x, he sends over the value d = h(k||x), where h is a cryptographic hash function. Does value d provide assurance to Hillary that Barack is the author of x and that x

was not modified by Bill? Justify your answer. What will be an ideal response?

Computer Science & Information Technology

____ files are cross-platform files that save font information, layout, and graphics placement with consistency.

a. BMP b. EPS c. PDF d. TIFF

Computer Science & Information Technology