Answer the following statement(s) true (T) or false (F)

1. A hacker weapon called a splog (spam blog) is a fake blog created solely to raise the search engine rank of affiliated websites.
2. Information security is a high priority for protection of the company's information, and it is critical to implement an information security procedure to combat misuse of this information.
3. Smoking areas are targeted by hackers; they regularly use smoking entrances to gain building access, where they pose as employees to gain access to the company network.
4. Downtime refers to a period of time when a system is unavailable, and unplanned downtime can strike at any time for various reasons.
5. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.


1. True
2. True
3. True
4. True
5. True

Computer Science & Information Technology

You might also like to view...

he For Each…Next repetition statement requires you to provide an array, its type and a variable for the purpose of:

a) preventing the statement from going past the end of the array b) storing the value of each typed element that’s traversed c) acting as a counter to traverse the array d) None of the above.

Computer Science & Information Technology

Excel inserts ____whenever it runs out of room on a page.

A. a blank row B. an automatic page break C. an automatic hyperlink D. a paragraph marker

Computer Science & Information Technology

Creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce.

What will be an ideal response?

Computer Science & Information Technology

What is the subscriber identity module (SIM)?

What will be an ideal response?

Computer Science & Information Technology