100% Pass
Which of the following defines a strong password? CORRECT ANS-All of the Above
You should complement your firewall program by installing a hardware firewall. CORRECT
ANS-True
Intruders use virus signatures to fabricate where an e-mail came from. CORRECT ANS-False
An access control list (or ACL) __________. CORRECT ANS-defines who can perform actions
on a file or folder
Packets recognize and record when a computer-to-computer connection ends. CORRECT
ANS-False
Viruses can reach your computer in which of the following ways? CORRECT ANS-A and C
only
Most vendors provide __________ that fix bugs in their products. CORRECT ANS-patches
The KRESV test should be used to program your firewall. CORRECT ANS-False