Answer the following statements true (T) or false (F)
1. The use of 802.1X cannot prevent rogue access points and other unauthorized devices from becoming insecure backdoors.
2. The principal threats to wireless transmission are eavesdropping, altering or inserting messages, and disruption.
3. The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions.
4. You should allow only specific computers to access your wireless network.
5. Security policies for mobile devices should assume that any mobile device will not be stolen or accessed by a malicious party.
1. FALSE
2. TRUE
3. TRUE
4. TRUE
5. FALSE
You might also like to view...
When implementing a method, use the class’s set and get methods to access the class’s ________ data.
a. public. b. private. c. protected. d. All of the above.
A(n) ____ chart provides a simple way to show trends and variations in a range of data within a single cell.
A. Sparkie B. Sparkline C. Special D. Sparkle
Case-Based Critical Thinking QuestionJohn is using PowerPoint to create an extensive marketing presentation and he keeps modifying the same slide layout by adding new placeholders for pictures and adjusting the text indents in the content placeholder. John wants to modify his presentation so he can work more efficiently. Which of the following should John use to solve the text indent problems he is having?
A. Open Slide Master view and adjust the indent levels on the slide layout. B. Adjust the indent levels on each slide. C. Format the master text by changing bullets. D. Modify the text indent theme.
A(n) _______ is software that controls a computer; it manages hardware, runs applications, provides interface for users, and stores, retrieves, and manipulates files.
A. DMA channel B. operating system C. CPU D. memory address