Answer the following statements true (T) or false (F)

1. The more critical a component or service, the higher the level of
availability required.

2. Computer security is essentially a battle of wits between a perpetrator
who tries to find holes and the administrator who tries to close them.

3. Security mechanisms typically do not involve more than one particular
algorithm or protocol.

4. Many security administrators view strong security as an impediment to
efficient and user-friendly operation of an information system.

5. In the context of security our concern is with the vulnerabilities of
system resources.

1. True
2. True
3. False
4. True
5. True

Computer Science & Information Technology

You might also like to view...

Blu-ray and DVDs are referred to as ________ media

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is not true about EIGRP?

a. Cisco proprietary. b. Allows the use of VLSM. c. Considered a hybrid protocol. d. All the above are true.

Computer Science & Information Technology