What are the biggest threats to a network in terms of security?
What will be an ideal response?
There are a variety of answers to this and it should give you an idea of the students' background in this area to listen to what they suggest.Some of the threats that should be named are worms and viruses, which can infect one host and spread through the network; intrusion into the network, which can allow messages to be intercepted; unauthorized use, which can compromise proprietary information or consume resources in an unintended manner; user compromise, which can grant unauthorized access to proprietary resources such as shared documents and servers; and denial-of-service attacks, which can render the network unusable.
You might also like to view...
The term _________________ refers to configuring a web page is optimally ranked by search engines
a. search engine optimization b. social media optimization c. Web analytics d. search engine results page
The acronym XML stands for________the Markup Language.
Fill in the blank(s) with the appropriate word(s).
________ help you work more efficiently and effectively on both personal and business-related documents
A) Productivity programs B) Operating systems C) Utility programs D) Application software programs
When you base a new master on an existing master, you start off with a ____ of the existing master with all of its master items.
A. list B. draft C. copy D. none of the above