Which of the following is not a type of cyber-attack?
(a) Kerberos.
(b) A trojan horse.
(c) A virus.
(d) Denial of service.
Ans: (a)
You might also like to view...
If Amelia spends $300 per year at The Gap and spends an average of $1500 per year on clothes, then the share of customer for The Gap:
A) is 20 percent B) is 50 percent C) is $300 D) cannot be determined with the information provided
Which of the following procedures would weaken control over cash receipts that arrive through the mail?
A. For safety, only one person should open the mail, and that person should immediately deposit the cash received in the bank. B. The bank reconciliation is prepared by a person who does not handle cash or record cash receipts. C. The employees handling the cash receipts are bonded. D. The cashier deposits the money in the bank and the recordkeeper records the amounts received in the accounting records. E. After the mail is opened, a list (in triplicate) of the money received is prepared with a record of the sender's name, the amount, and an explanation of why the money is sent.
All products have some identification and are therefore potential brands.
a. True b. False
______ constraints limit the size or length of a finite queue.
A. Capacity B. Demand C. Service D. Time