Which of the following is a hardware or software device that controls traffic and limits specific activity?

a. IDS
b. Firewall
c. Honeypot
d. Honeynet


ANS: B

Computer Science & Information Technology

You might also like to view...

The strategy that is used to break a problem down into smaller pieces that can be more easily handled is called:

a. Code reuse b. Divide and conquer c. Inheritance d. Parameter e. None of these

Computer Science & Information Technology

Modify Programming Project 5 from Chapter 2 to check the validity of input data. Valid input is no less than 25 cents, no more than 100 cents, and an integer multiple of 5 cents. Compute the change only if a valid price is entered. Otherwise, print separate error messages for any of the following invalid inputs: a price under 25 cents, a price that is not an integer multiple of 5, and a price that is more than a dollar.

This project is a simple modification of Project 5 from Chapter 2. Three if statements are added to detect invalid input: less than 25 cents, more than a dollar, and not a multiple of 5 cents.

Computer Science & Information Technology

Which of the following is true about the security staffing, budget, and needs of a medium-sized organization?

A. It has a larger dedicated (full-time) security staff than a small organization. B. It has a larger security budget (as percent of IT budget) than a small organization. C. It has a smaller security budget (as percent of IT budget) than a large organization. D. It has larger information security needs than a small organization.

Computer Science & Information Technology

A photograph's color intensity can be modified by changing the brightness and contrast.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology