What security term describes a program written to collect information and store it on the hard drive?
A) Virus
B) Intrusion detection and alerts
C) Cookie
D) Authentication
C
You might also like to view...
Discuss why a company might need to add roles and competencies to the EBK basic model.
What will be an ideal response?
Worksheet labels are the column letters and row numbers.
Answer the following statement true (T) or false (F)
Answer the following statements true (T) or false (F)
1) An attribute that begins with a single underscore is a private attribute. 2) The destructor is called when the keyword del is used on an object. 3) A shared class attribute should be initialized in the constructor. 4) When invoking an object’s method, a program does not need to pass a value that corresponds to the object reference parameter. 5) Every class should have a __del__ method to reclaim an object’s memory.
An engineer is performing the IP subnet design for an organization and needs to find the best mask that should be used. The organization has been assigned the 172.52.239.0/24 network. The addresses must be split up so that they can be equally organized into 10 subnets of at least 32 addresses. Which mask would best fit this requirement?
A) 255.255.255.240 B) 255.255.255.224 C) 255.255.255.248 D) None