Match each item with a statement below:
A. an organization's set of rules regarding how to handle and protect sensitive data
B. the first level of security in any network
C. once it is activated it can replicate itself throughout the network by taking advantage of services on computers in the network
D. these viruses change their appearance each time they replicate or infect
E. type of malware that appears to perform a desired function but in fact performs malicious functions
F. the primary method of keeping hackers out of a network
G. a security device that can detect a hacker's attempts to gain access to the network
H. a single-key encryption method
I. uses a mathematically matched key pair
A. Security policy
B. Physical security
C. Worm
D. Polymorphic virus
E. Trojan Horse
F. Firewall
G. IDS
H. Symmetric key encryption
I. Asymmetric key encryption
You might also like to view...
Thanks to ACPI, a network administrator can remotely power on a computer with a _____ command
A) Soft-off B) BIOS Flash C) Wake on LAN D) Hot Key Power On
Which of the following statements will remove an object referred to by the object variable NewStudent?
a. NewStudent = String.Empty b. NewStudent = Nothing c. NewStudent.Delete d. Remove.NewStudent