SlideShare une entreprise Scribd logo
1  sur  1
Which of the following is an effective method of preventing computer viruses from spreading?
A. Require root/administrator access to run programs.
B. Enable scanning of e-mail attachments.
C. Prevent the execution of .vbs files.
D. Install a host based IDS (Intrusion Detection System)
Solution
D. Install a host based IDS (Intrusion Detection System)
Dictionaries may be used in a cracking program to determine passwords. A short dictionary
attack involves
trying a list of hundreds or thousands of words that are frequently chosen as passwords against
several systems.
Although most systems resist such attacks, some do not. In one case, one system in five yielded
to a particular dictionary attack.
Incorrect answers:

Contenu connexe

Plus de toddr84

Plus de toddr84 (16)

Which of the following is likely to contradict Samuel Huntington-'s id.docx
Which of the following is likely to contradict Samuel Huntington-'s id.docxWhich of the following is likely to contradict Samuel Huntington-'s id.docx
Which of the following is likely to contradict Samuel Huntington-'s id.docx
 
Which of the following is correct- (a) Function dependencies are not a.docx
Which of the following is correct- (a) Function dependencies are not a.docxWhich of the following is correct- (a) Function dependencies are not a.docx
Which of the following is correct- (a) Function dependencies are not a.docx
 
Which of the following is considered middleware- A- Atomicity B- OLE C.docx
Which of the following is considered middleware- A- Atomicity B- OLE C.docxWhich of the following is considered middleware- A- Atomicity B- OLE C.docx
Which of the following is considered middleware- A- Atomicity B- OLE C.docx
 
Which of the following is considered a state function and why- Ice.docx
Which of the following is considered a state function and why-     Ice.docxWhich of the following is considered a state function and why-     Ice.docx
Which of the following is considered a state function and why- Ice.docx
 
Which of the following is a part of a DML statement- CREATE ALTER DROP.docx
Which of the following is a part of a DML statement- CREATE ALTER DROP.docxWhich of the following is a part of a DML statement- CREATE ALTER DROP.docx
Which of the following is a part of a DML statement- CREATE ALTER DROP.docx
 
Which of the following is a liquidity ratio- Price earnings (P-E)-.docx
Which of the following is a liquidity ratio-     Price earnings (P-E)-.docxWhich of the following is a liquidity ratio-     Price earnings (P-E)-.docx
Which of the following is a liquidity ratio- Price earnings (P-E)-.docx
 
Which of the following ions are likely not to exist in biological sett.docx
Which of the following ions are likely not to exist in biological sett.docxWhich of the following ions are likely not to exist in biological sett.docx
Which of the following ions are likely not to exist in biological sett.docx
 
Which of the following ions has an unusual or incorrect charge- Te2- B.docx
Which of the following ions has an unusual or incorrect charge- Te2- B.docxWhich of the following ions has an unusual or incorrect charge- Te2- B.docx
Which of the following ions has an unusual or incorrect charge- Te2- B.docx
 
Which of the following international organizations was established to.docx
Which of the following international organizations was established to.docxWhich of the following international organizations was established to.docx
Which of the following international organizations was established to.docx
 
Which of the following functions did congressional legislation give to.docx
Which of the following functions did congressional legislation give to.docxWhich of the following functions did congressional legislation give to.docx
Which of the following functions did congressional legislation give to.docx
 
Which of the following file structures is associated with the phenomen.docx
Which of the following file structures is associated with the phenomen.docxWhich of the following file structures is associated with the phenomen.docx
Which of the following file structures is associated with the phenomen.docx
 
Which of the following factors turned the budget surplus into a defici.docx
Which of the following factors turned the budget surplus into a defici.docxWhich of the following factors turned the budget surplus into a defici.docx
Which of the following factors turned the budget surplus into a defici.docx
 
which of the following elements would you expect to form mainly covale.docx
which of the following elements would you expect to form mainly covale.docxwhich of the following elements would you expect to form mainly covale.docx
which of the following elements would you expect to form mainly covale.docx
 
which technique allows multiple applications to share a transport conn.docx
which technique allows multiple applications to share a transport conn.docxwhich technique allows multiple applications to share a transport conn.docx
which technique allows multiple applications to share a transport conn.docx
 
which statements are correct with the transport layer- i the ultimate.docx
which statements are correct with the transport layer- i the ultimate.docxwhich statements are correct with the transport layer- i the ultimate.docx
which statements are correct with the transport layer- i the ultimate.docx
 
Which of the following is not a function of decomposition- (Points - 5.docx
Which of the following is not a function of decomposition- (Points - 5.docxWhich of the following is not a function of decomposition- (Points - 5.docx
Which of the following is not a function of decomposition- (Points - 5.docx
 

Dernier

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Dernier (20)

Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 

Which of the following is an effective method of preventing computer v.docx

  • 1. Which of the following is an effective method of preventing computer viruses from spreading? A. Require root/administrator access to run programs. B. Enable scanning of e-mail attachments. C. Prevent the execution of .vbs files. D. Install a host based IDS (Intrusion Detection System) Solution D. Install a host based IDS (Intrusion Detection System) Dictionaries may be used in a cracking program to determine passwords. A short dictionary attack involves trying a list of hundreds or thousands of words that are frequently chosen as passwords against several systems. Although most systems resist such attacks, some do not. In one case, one system in five yielded to a particular dictionary attack. Incorrect answers: