Answer the following statements true (T) or false (F)

1. Hardware is the most vulnerable to attack and the least susceptible to
automated controls.

2. Contingency planning is a functional area that primarily requires
computer security technical measures.

3. X.800 architecture was developed as an international standard and
focuses on security in the context of networks and communications.

4. The first step in devising security services and mechanisms is to
develop a security policy.

5. Assurance is the process of examining a computer product or system
with respect to certain criteria.

1. True
2. False
3. True
4. True
5. False

Computer Science & Information Technology

You might also like to view...

Scanner resolution is measured in dots per inch; the farther apart the dots, the clearer the image.

a. true b. false

Computer Science & Information Technology

An email administrator is tasked to set up a Linux mail server. One of the requirements is to close all ports except SSH, HTTPS, SMTP, POP3, and IMAP4. Which of the following commands should be used to see which ports are currently open on the email server? (Choose two.)

A. lsof B. netstat C. ipconfig D. traceroute E. ping F. dig

Computer Science & Information Technology