What are frequently the weakest link in information security?

A. wireless networks
B. passwords
C. unmanaged switches
D. malfunctioning routers


Answer: B

Computer Science & Information Technology

You might also like to view...

A ____ space is a color space used to define and edit colors while you are in an Adobe application.

a. time b. three-dimensional c. working d. managed

Computer Science & Information Technology

What CLI command can be issued in CentOS 7 to help you to see every "hop" that a connection makes, including all of the switches, routers, firewalls, or other computers that your communication hops across to reach the requested host?

A. trace B. ping C. trackip D. traceroute

Computer Science & Information Technology

If you enter an incomplete Ruby statement into the IRB, it will ____.

A. Execute the incomplete statements and generate an error B. Display a modified command prompt and wait on you to finish entering the statement C. Display a warning message and reject your input D. None of the above

Computer Science & Information Technology

What packet-switching standard designed for and used primarily with T-carrier lines is very fast, but does not guarantee data integrity?

A. ATM B. Frame Relay C. TCP/IP D. Multi-Protocol Label Switching (MPLS)

Computer Science & Information Technology