The macro virus infects the key operating system files located in a computers start up sector
TrueFalseQUESTION 4Themacro virus infects the key operating system files located in acomputer’s start-up sector. __________4 pointsSavedQUESTION 5Technology services are usually arranged with an agreementdefining minimum service levels known as a(n) __________.4 pointsSavedQUESTION 6This collaborative support group began as a cooperative effortbetween the FBI’s Cleveland field office and local technologyprofessionals with a focus of protecting critical nationalinfrastructure.CyberWatchCyberGardInfraGardHomeland Security4 pointsSavedQUESTION 7InfraGard began as a cooperative effort between the FBI’sCleveland field office and localintelligence professionals.___________4 pointsSavedQUESTION 84iQuestion Completion Status:Click Save and Submit to save and submit. Click Save All Answers to save all answers. Show Related Questions
Chapter 02 The Need for Security TRUEFALSE 1. Information security's primary mission is to ensure that systems and their contents retain their confidentiality at any cost. (A) True (B) False Answer : (B) 2. The information security function in an organization safeguards its technology assets. (A) True (B) False Answer : (A) 3. As an organization grows, it must often use more robust technology to replace the security technologies it may have outgrown. (A) True (B) False Answer : (A) 4. Suppose an act of theft performed by a hacker was accompanied by defacement actions to delay discovery. The first act is obviously in the category of "theft" but the second act is another category-in this case it is a "force of nature." (A) True (B) False Answer : (B) 5. Two watchdog organizations that investigate allegations of software abuse are the Software & Information Industry Association (SIIA) and National Security Agency (NSA). (A) True (B) False Answer : (B) What type of virus is written in a macro language and placed in a document or table?A macro virus is a computer virus written in the same macro language used to create software programs such as Microsoft Excel or Word.
What is Information Security's primary mission?Information security's primary mission is to ensure that systems and their contents retain their confidentiality at any cost.
When voltage levels lag the extra voltage can severely damage or destroy equipment?When voltage levels surge (experience a momentary increase), the extra voltage can severely damage or destroy equipment. The application of computing and network resources to try every possible combination of options of a password is called a brute crack attack.
What is the difference between machine executable and macro viruses?Machine executable viruses are attached to some executable program while a macro virus infects the content of popularly used applications. This means that a macro virus tends to be platform independent and you cannot use traditional file system access controls to keep the virus from spreading.
|