This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: The purpose of a(n) _____ is to disrupt normal computer processing, or deny processing entirely. Selected Answer: necessity threat Question 7 1 out of 1 points Asymmetric encryption encodes a message with one of several available algorithms that use a single numeric key, such as 456839420783, to encode and decode data. Selected Answer: False Question 8 1 out of 1 points Ethical hackers are often hired by companies to test computer security safeguards. Selected Answer: True Question 9 1 out of 1 points A(n) _____ is a program hidden inside another program or Web page that masks its true purpose. Selected Answer: Trojan horse Question 10 1 out of 1 points A(n) _____ is an area of memory set aside to hold data read from a file or database. Selected Answer: buffer...
View Full Document
- Spring '09
- Computer Security, active Content