SlideShare una empresa de Scribd logo
1 de 1
Which of the following is an effective method of preventing computer viruses from spreading?
A. Require root/administrator access to run programs.
B. Enable scanning of e-mail attachments.
C. Prevent the execution of .vbs files.
D. Install a host based IDS (Intrusion Detection System)
Solution
D. Install a host based IDS (Intrusion Detection System)
Dictionaries may be used in a cracking program to determine passwords. A short dictionary
attack involves
trying a list of hundreds or thousands of words that are frequently chosen as passwords against
several systems.
Although most systems resist such attacks, some do not. In one case, one system in five yielded
to a particular dictionary attack.
Incorrect answers:

Más contenido relacionado

Más de toddr84

Which of the following is likely to contradict Samuel Huntington-'s id.docx
Which of the following is likely to contradict Samuel Huntington-'s id.docxWhich of the following is likely to contradict Samuel Huntington-'s id.docx
Which of the following is likely to contradict Samuel Huntington-'s id.docxtoddr84
 
Which of the following is correct- (a) Function dependencies are not a.docx
Which of the following is correct- (a) Function dependencies are not a.docxWhich of the following is correct- (a) Function dependencies are not a.docx
Which of the following is correct- (a) Function dependencies are not a.docxtoddr84
 
Which of the following is considered middleware- A- Atomicity B- OLE C.docx
Which of the following is considered middleware- A- Atomicity B- OLE C.docxWhich of the following is considered middleware- A- Atomicity B- OLE C.docx
Which of the following is considered middleware- A- Atomicity B- OLE C.docxtoddr84
 
Which of the following is considered a state function and why- Ice.docx
Which of the following is considered a state function and why-     Ice.docxWhich of the following is considered a state function and why-     Ice.docx
Which of the following is considered a state function and why- Ice.docxtoddr84
 
Which of the following is a part of a DML statement- CREATE ALTER DROP.docx
Which of the following is a part of a DML statement- CREATE ALTER DROP.docxWhich of the following is a part of a DML statement- CREATE ALTER DROP.docx
Which of the following is a part of a DML statement- CREATE ALTER DROP.docxtoddr84
 
Which of the following is a liquidity ratio- Price earnings (P-E)-.docx
Which of the following is a liquidity ratio-     Price earnings (P-E)-.docxWhich of the following is a liquidity ratio-     Price earnings (P-E)-.docx
Which of the following is a liquidity ratio- Price earnings (P-E)-.docxtoddr84
 
Which of the following ions are likely not to exist in biological sett.docx
Which of the following ions are likely not to exist in biological sett.docxWhich of the following ions are likely not to exist in biological sett.docx
Which of the following ions are likely not to exist in biological sett.docxtoddr84
 
Which of the following ions has an unusual or incorrect charge- Te2- B.docx
Which of the following ions has an unusual or incorrect charge- Te2- B.docxWhich of the following ions has an unusual or incorrect charge- Te2- B.docx
Which of the following ions has an unusual or incorrect charge- Te2- B.docxtoddr84
 
Which of the following international organizations was established to.docx
Which of the following international organizations was established to.docxWhich of the following international organizations was established to.docx
Which of the following international organizations was established to.docxtoddr84
 
Which of the following functions did congressional legislation give to.docx
Which of the following functions did congressional legislation give to.docxWhich of the following functions did congressional legislation give to.docx
Which of the following functions did congressional legislation give to.docxtoddr84
 
Which of the following file structures is associated with the phenomen.docx
Which of the following file structures is associated with the phenomen.docxWhich of the following file structures is associated with the phenomen.docx
Which of the following file structures is associated with the phenomen.docxtoddr84
 
Which of the following factors turned the budget surplus into a defici.docx
Which of the following factors turned the budget surplus into a defici.docxWhich of the following factors turned the budget surplus into a defici.docx
Which of the following factors turned the budget surplus into a defici.docxtoddr84
 
which of the following elements would you expect to form mainly covale.docx
which of the following elements would you expect to form mainly covale.docxwhich of the following elements would you expect to form mainly covale.docx
which of the following elements would you expect to form mainly covale.docxtoddr84
 
which technique allows multiple applications to share a transport conn.docx
which technique allows multiple applications to share a transport conn.docxwhich technique allows multiple applications to share a transport conn.docx
which technique allows multiple applications to share a transport conn.docxtoddr84
 
which statements are correct with the transport layer- i the ultimate.docx
which statements are correct with the transport layer- i the ultimate.docxwhich statements are correct with the transport layer- i the ultimate.docx
which statements are correct with the transport layer- i the ultimate.docxtoddr84
 
Which of the following is not a function of decomposition- (Points - 5.docx
Which of the following is not a function of decomposition- (Points - 5.docxWhich of the following is not a function of decomposition- (Points - 5.docx
Which of the following is not a function of decomposition- (Points - 5.docxtoddr84
 

Más de toddr84 (16)

Which of the following is likely to contradict Samuel Huntington-'s id.docx
Which of the following is likely to contradict Samuel Huntington-'s id.docxWhich of the following is likely to contradict Samuel Huntington-'s id.docx
Which of the following is likely to contradict Samuel Huntington-'s id.docx
 
Which of the following is correct- (a) Function dependencies are not a.docx
Which of the following is correct- (a) Function dependencies are not a.docxWhich of the following is correct- (a) Function dependencies are not a.docx
Which of the following is correct- (a) Function dependencies are not a.docx
 
Which of the following is considered middleware- A- Atomicity B- OLE C.docx
Which of the following is considered middleware- A- Atomicity B- OLE C.docxWhich of the following is considered middleware- A- Atomicity B- OLE C.docx
Which of the following is considered middleware- A- Atomicity B- OLE C.docx
 
Which of the following is considered a state function and why- Ice.docx
Which of the following is considered a state function and why-     Ice.docxWhich of the following is considered a state function and why-     Ice.docx
Which of the following is considered a state function and why- Ice.docx
 
Which of the following is a part of a DML statement- CREATE ALTER DROP.docx
Which of the following is a part of a DML statement- CREATE ALTER DROP.docxWhich of the following is a part of a DML statement- CREATE ALTER DROP.docx
Which of the following is a part of a DML statement- CREATE ALTER DROP.docx
 
Which of the following is a liquidity ratio- Price earnings (P-E)-.docx
Which of the following is a liquidity ratio-     Price earnings (P-E)-.docxWhich of the following is a liquidity ratio-     Price earnings (P-E)-.docx
Which of the following is a liquidity ratio- Price earnings (P-E)-.docx
 
Which of the following ions are likely not to exist in biological sett.docx
Which of the following ions are likely not to exist in biological sett.docxWhich of the following ions are likely not to exist in biological sett.docx
Which of the following ions are likely not to exist in biological sett.docx
 
Which of the following ions has an unusual or incorrect charge- Te2- B.docx
Which of the following ions has an unusual or incorrect charge- Te2- B.docxWhich of the following ions has an unusual or incorrect charge- Te2- B.docx
Which of the following ions has an unusual or incorrect charge- Te2- B.docx
 
Which of the following international organizations was established to.docx
Which of the following international organizations was established to.docxWhich of the following international organizations was established to.docx
Which of the following international organizations was established to.docx
 
Which of the following functions did congressional legislation give to.docx
Which of the following functions did congressional legislation give to.docxWhich of the following functions did congressional legislation give to.docx
Which of the following functions did congressional legislation give to.docx
 
Which of the following file structures is associated with the phenomen.docx
Which of the following file structures is associated with the phenomen.docxWhich of the following file structures is associated with the phenomen.docx
Which of the following file structures is associated with the phenomen.docx
 
Which of the following factors turned the budget surplus into a defici.docx
Which of the following factors turned the budget surplus into a defici.docxWhich of the following factors turned the budget surplus into a defici.docx
Which of the following factors turned the budget surplus into a defici.docx
 
which of the following elements would you expect to form mainly covale.docx
which of the following elements would you expect to form mainly covale.docxwhich of the following elements would you expect to form mainly covale.docx
which of the following elements would you expect to form mainly covale.docx
 
which technique allows multiple applications to share a transport conn.docx
which technique allows multiple applications to share a transport conn.docxwhich technique allows multiple applications to share a transport conn.docx
which technique allows multiple applications to share a transport conn.docx
 
which statements are correct with the transport layer- i the ultimate.docx
which statements are correct with the transport layer- i the ultimate.docxwhich statements are correct with the transport layer- i the ultimate.docx
which statements are correct with the transport layer- i the ultimate.docx
 
Which of the following is not a function of decomposition- (Points - 5.docx
Which of the following is not a function of decomposition- (Points - 5.docxWhich of the following is not a function of decomposition- (Points - 5.docx
Which of the following is not a function of decomposition- (Points - 5.docx
 

Último

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Último (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Which of the following is an effective method of preventing computer v.docx

  • 1. Which of the following is an effective method of preventing computer viruses from spreading? A. Require root/administrator access to run programs. B. Enable scanning of e-mail attachments. C. Prevent the execution of .vbs files. D. Install a host based IDS (Intrusion Detection System) Solution D. Install a host based IDS (Intrusion Detection System) Dictionaries may be used in a cracking program to determine passwords. A short dictionary attack involves trying a list of hundreds or thousands of words that are frequently chosen as passwords against several systems. Although most systems resist such attacks, some do not. In one case, one system in five yielded to a particular dictionary attack. Incorrect answers: