Match each item with a statement below:
?

A. documents used in encryption and authentication protocols that identify a person or computer and can be verified by a certification authority
B. spreads by replicating itself into programs or documents
C. monopolizes network services or network bandwidth
D. inspects packets as they go into and out of the network
E. a series of letters, numbers, and special characters, much like a password, that both communicating devices use to authenticate each other's identity
F. time-dependent malware that can come in different forms. Its main characteristic is that it's activated when a particular event occurs
G. a self-contained, self-replicating program
H. packets are denied on context as well as packet properties
I. used to discover breaches in security
J. permits access to computer, bypasses normal authentication

A. digital certificates
B. virus
C. denial-of-service
D. firewall
E. preshared key
F. logic bomb
G. worm
H. stateful packet inspection
I. IDS
J. backdoor

Computer Science & Information Technology

You might also like to view...

Which of the following statements about Try blocks is true?

a) The Try block must be followed by at least one Catch block. b) The Try block must be followed by a Finally block. c) The Try block should contain statements that may process an exception. d) The Try block should contain statements that may throw an exception.

Computer Science & Information Technology

Use the ________________ property to configure rounded corners with CSS.

a. border-round b. border-radius c. box-shadow d. background-corner

Computer Science & Information Technology