Which of the following best defines what signatures are?
a. IP addresses of known hackers.
b. The email address of known attackers.
c. Indicators of known attacks.
d. None of these answers is correct.
c. Indicators of known attacks.
You might also like to view...
A ____________ contains data that has been encoded as text using a scheme such as ASCII.
a. document (as on MS-Word or Open-Document Format) b. spreadsheet (as in Excel) c. binary file d. text file
In Photoshop, the term ____ refers to specific operations that you make to change the location of pixels.
A. transfer B. change C. relocate D. transform
There was a time when a Web page would be made entirely of words or text. Today, pictures and graphics dominate Web pages, attracting a greater number of visitors than ever before.
Answer the following statement true (T) or false (F)
A company has just installed a new network switch for an expanding department. The company is also piloting the use of a VoIP phone system for this department. Which of the following should be enabled on the new network switch?
A. WINS B. QoS C. NAT D. DHCP