BA 2663 ch 8 question and answers
1 Threats that are unlikely to occur can be ignored when the cost to protect against the threat exceeds the value of the protected asset. True (True Answer ) False 2 In the context of the elements of computer security, necessity refers to preventing data delays or denials. True (True Answer ) False 3 Networks outside a firewall are referred to as trusted networks. True False (True Answer ) 4 The most complete way for Web site visitors to protect themselves from revealing private information or being tracked by cookies is to disable cookies entirely. True (True Answer ) False 5 Active content elements are programs that run on the server. True False (True Answer ) 6 Active content can pose a threat to the security of client devices. True (True Answer ) False 7 People who write programs or manipulate technologies to obtain unauthorized access to computers and networks are called crackers. True (True Answer ) False 8 Active content is launched in a Web browser automatically prior to the browser loading the Web page containing active content. True False (True Answer ) 9 Applets typically run within the Web browser and are most often written in the Java programming language. True (True Answer
Written for
- Institution
-
State University Of New York - Binghamton
- Course
-
BA 2663
Document information
- Uploaded on
- October 18, 2022
- Number of pages
- 18
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers