The first rule of computer security is to check ___________
a. Patches
b. Ports
c. Policies
d. None of the above
Answer A. The operating system, database management systems, development tools, and Internet browsers should be checked for patches.
Computer Science & Information Technology
You might also like to view...
The discussion of base/bounds registers implies that program code is execute-only, and data areas are read-write-only. Is this ever not the case? Explain your answer
What will be an ideal response?
Computer Science & Information Technology
Which of the following statements about symmetric key cryptography is not true?
A) Symmetric key cryptography uses one shared key. B) Symmetric algorithms can provide confidentiality. C) Symmetric algorithms can provide nonrepudiation and authenticity. D) Symmetric key cryptography uses a single secret key.
Computer Science & Information Technology