Match each item with a statement below:

A. an organization's set of rules regarding how to handle and protect sensitive data
B. the first level of security in any network
C. once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
D. these viruses change their appearance each time they replicate or infect
E. type of malware that appears to perform a desired function but in fact performs malicious functions
F. the primary method of keeping hackers out of a network
G. a security device that can detect a hacker's attempts to gain access to the network
H. a single-key encryption method
I. uses a mathematically matched key pair


A. Security policy
B. Physical security
C. Worm
D. Polymorphic virus
E. Trojan Horse
F. Firewall
G. IDS
H. Symmetric key encryption
I. Asymmetric key encryption

Computer Science & Information Technology

You might also like to view...

Use the ______ attribute to configure the width of a table border.

a. tableborder b. width c. border d. none of the above

Computer Science & Information Technology

Which of the following is FALSE about tables in Word 2010?

A) Text wraps in cells and, therefore, does not affect the entries in other cells. B) From the Table command, you drag to select the number of columns and rows you want. C) A table is created from the Insert tab. D) You can format a row or column differently than the rest of a table, but not an individual cell.

Computer Science & Information Technology

A JPG image is a complex data structure containing compressed DCT coefficients for ____ blocks of pixels.

A. 4x4 B. 8x8 C. 16x16 D. 32x32

Computer Science & Information Technology

Encapsulation allows objects to be used as modular components anywhere in the system.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology