Windows Firewall ________
A) detects worms already on your computer
B) blocks spam
C) prevents you from opening e-mails with dangerous attachments
D) blocks unwanted intrusions
D
You might also like to view...
An attacker is trying to discover the contents of encrypted messages that he can easily intercept. The attacker attempts to break messages by intercepting and substituting his own messages in a communications stream between two parties. This type of attack is known as:
a. Unknown plaintext b. Known ciphertext c. Man in the middle d. Replay
To create a fixed space between all components using BoxLayout, use the method ________.
a. createVerticalStrut() b. createHorizontalStrut() c. createGlue() d. createRigidArea()
If an application window is minimized, clicking the application's button on the ____ restores the window to its previous size and location.
A. status bar B. taskbar C. title bar D. menu bar
How does the merge sort algorithm split an array of elements?
a. It uses the size of the array to divide the array into two smaller arrays b. It uses a pivot element c. It splits an array in an arbitrary fashion d. It uses the average of the elements to compute the midpoint