Chapter 7
Answer 1:
d. Programs that infect other software or files. They require an executable (a running program) to spread, attaching to other executables.
Answer 2:
b. Used to distinguish if a task is being performed by a computer or a human – e.g., CAPTCHAs.
Answer 3:
c. A firewall is a highly tempting, but bogus target meant to draw hacking attempts.
Answer 4:
a. Information security is not simply a technical fix.
Answer 5:
d. Attention to industry rivals.
Please give thumbsup, or do comment in case of any query. Thanks.
Get Answers For Free
Most questions answered within 1 hours.