Chapter 1
Question 1
When solving problems, what is the first step?
Develop possible solutions
Recognize and define the problem
Analyze and compare the possible solutions
Select, implement and evaluate a solution
Question 2
The C.I.A. triad for computer security includes which of these characteristics?
availability
authorization
accountability
authentication
Question 3
A malware programs that hides its true nature, and reveals its designed behavior only when activated is called a(n) ____________.
Trojan horse
Virus
Spam
Worm
Question 4
An act where people enter real or virtual premises or systems they have not been authorized to enter is called ____________.
security
theft
trespass
bypass
Question 5
What function will an audit log provide when it is configured to track user activity on an information system?
authorization
identification
authentication
accountability
The post Chapter 1
Question 1
When solving problems, what is the first step?
Develop poss appeared first on Assignmentio.