Explain in brief any 2 security threats to computer networks. -Technology

1 Answer

Answer :

Two security threats to computer networks are as follows :1. Computer worm It is a standalone malware computer program that replicates itself in order to spread to other computers.2. Spam It is flooding the Internet with many copies of the same message.

Related questions

Description : Explain the given terms with respect to computer networks: 1. File and Data Sharing 2. Distributing Computing Power -Technology

Last Answer : 1. File and Data SharingAt a time, file-sharing consisted mostly of saving documents to floppy disks that could be physically transferred to other computers by hand. With networking, files can be shared ... to a network. Any user on the network can access the resources stored on the server.

Description : The type of threats on the security of a computer system or network are …………………….. i) Interruption ii)Interception iii) Modification iv) Creation v)Fabrication a) i, ii, iii and iv only b) ii, iii, iv and v only c) i, ii, iii and v only d) All i, ii, iii, iv and v

Last Answer : c) i, ii, iii and v only

Description : The type of threats on the security of a computer system or network are …………………….. i) Interruption ii) Interception iii) Modification iv) Creation v) Fabrication A) i, ii, iii and iv only B) ii, iii, iv and v only C) i, ii, iii and v only D) All i, ii, iii, iv and v

Last Answer : C) i, ii, iii and v only

Description : MAN’s are the computer networks confined to a localised area such as an office. -Technology

Last Answer : FalseLAN’s are the computer networks confined to a localised area such as an office.

Description : Expand the following terms related to Computer Networks: a. SMTP b. POP c. FTP d. VoIP -Technology

Last Answer : a. SMTP: Simple Mail Transfer Protocolb. POP: Point to Point Protocolc. FTP: File Transfer Protocold. VoIP: Voice over Internet Protocol

Description : What does an antivirus software do? Explain in brief with any two points. -Technology

Last Answer : 1. Antivirus software is a computer program that detects, prevents and takes action to disarm or remove malicious software programs, such as viruses and worms.2. Displays health of your computer system.

Description : If some other nation had clandestine organizations working US soil to capture or eliminate citizens or legal foreign nations on belief they were criminals or security threats, would the US view this organization as criminal or terrorist?

Last Answer : answer:First, this isn't an IF' question. It almost assuredly is truly happening today. Second, I think that the underlying question is how and what the are doing. Terror is generally described as activities ... nowadays in the name of national security'. We do not live in a moral or fair world.

Description : How should security be handled with juvenile death threats in the school community?

Last Answer : If they’re not concerned, why should you be?

Description : Role of security auditor is to ____________ a) secure the network b) probe for safety and security of organization’s security components and systems c) detects and prevents cyber attacks and threats to organization d) does penetration testing on different web applications

Last Answer : b) probe for safety and security of organization’s security components and systems

Description : What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets? a. Risk management b. Risk assessment c. Security d. None of the above

Last Answer : b. Risk assessment

Description : What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness? a. Risk management b. Risk assessment c. Security d. None of the above

Last Answer : a. Risk management

Description : ………… allows delivery of voice communications over IP networks. -Technology

Last Answer : VoIP allows delivery of voice communications over IP networks.

Description : Which cable networks are used for LAN connections? -Technology

Last Answer : Twisted pair and fibre optic cables are used for LAN connection.

Description : ………. is the formation of networks. -Technology

Last Answer : Networkingis the formation of networks.

Description : ……….. is called network of networks. -Technology

Last Answer : Internetis called network of networks.

Description : Write a brief note on Vividh Bharati Services. -Technology

Last Answer : Vividh Bharati was started on 2nd October 1957, as a service of 'light entertainment' to compete with Radio Ceylon.Earlier, AIR had banned film music on its prgrammes. Sponsored programmes were ... rest of the time was given to devotional music, short plays, short stories and poetry recitals.

Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data

Last Answer : a. Identifying weakness in computer system or networks

Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data

Last Answer : d. Protocols of corrupting data

Description : which of the following countermeasures can help reduce technology-associated insider threats -General Knowledge

Last Answer : Inventory your technology holdings; use strong passwords, prevent unauthorized access, and watch for behavioral indicators are countermeasures that can help reduce technology-associated insider threats.

Description : In IPv6,a ______address is used ifa site with several networks uses the Internetprotocols but is not connectedto the Internet for security reasons. A) link local B) site local C) mapped D) none of the abov

Last Answer : site local

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : Considering areas of concern, external network requirements, internal network requirements is the evaluation of a) Assess the security provisions for cloud applications b) Ensure cloud networks and ... Manage people, roles and identities d) Understand the security requirements of the exit process

Last Answer : Ensure cloud networks and connections are secure

Description : What is Wired Equivalent Privacy (WEP)? a) security algorithm for ethernet b) security algorithm for wireless networks c) security algorithm for usb communication d) security algorithm for emails

Last Answer : b) security algorithm for wireless networks

Description : SATAN stands for_ a. Security Advanced Tool for Analysis Networks b. Security Admin Tool for Analysis Networks c. Security Administrator Tool for Analysis Networks d. Security Administrator Tool for Analysing Network

Last Answer : c. Security Administrator Tool for Analysis Networks

Description :  ________ in IoT as one of the key characteristics, devices have different hardware platforms and networks. A. Sensors B. Heterogeneity C. Security D. Connectivity

Last Answer : B. Heterogeneity 

Description : ADT Burglar Alarms For House Security – A Brief Guide ?

Last Answer : House security is one of the first things you need to take care of when it comes to making contingency plans for the future. Good burglar alarms are a necessity nowadays, with rising crime rates. ... doing things right. For more details about ADT please log on to http://www.firsthomesecurity.co.uk

Description : Is there a way I can see my wireless network's internet history?

Last Answer : Your router should have a page that lists what sites were visited by what computers. How to get to that page depends on your router.

Description : Which of the following is/are threats for electronic payment systems? a) Computer worms b) Computer Virus c) Trojan horse d) All of the above

Last Answer : d) All of the above

Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above

Last Answer : iv) All of the above

Description : Duplication of data is known as (a) data security (b) data incomplete -Technology

Last Answer : (c) Data redundancy means duplication of data. It eliminates replication of data item into different files from a large database.

Description : ………….. feature is available in Windows 7 ultimate for data security. -Technology

Last Answer : BitLocker Data Protection feature is available in Windows 7 ultimate for data security.

Description : Name two other means of online security measures. -Technology

Last Answer : Digital signature and Digital certificate

Description : Which security provision is used to ensure data integrity and authentication? -Technology

Last Answer : A digital signature helps the user to ensure data integrity and authentication.

Description : Define information security. -Technology

Last Answer : Information security is all about protecting and preserving information. It’s all about protecting and preserving the confidentiality, integrity, authenticity, availability, and reliability of information.

Description : ………. security technology establishes an encrypted link between a Web server and browser. -Technology

Last Answer : SSL security technology establishes an encrypted link between a Web server and browser.

Description : Cracker is a person who breaks security to see what we have stored on our computers with mat intentions. -Technology

Last Answer : True Cracker breaks security with mal intentions.

Description : Write down the major issues of security and integrity of information. -Technology

Last Answer : There are three major issues as follows:1. Confidentiality2. Integrity3. Availability

Description : IT security today has become a major point of concern. What comes under IT security? -Technology

Last Answer : IT security is a term which is more concerned with the protection of hardware,software and a network of an organisation, from the perils of disaster and external attacks through virus, hacking etc.

Description : Making backups, keeping passwords and having access control are used for ………….. (a) Data security -Technology

Last Answer : (a) Backups, access authorised are the techniques to secure data from damage and getting lost.

Description : The term is used to represent_“information is accurate and complete” (a) Security (b) Integrity (c) Completeness (d) Counterfeiting -Technology

Last Answer : (b) Integrity means information is accurate and complete.

Description : i. select city from training where topic = 'Cyber Security'; -Technology

Last Answer : i. New DelhiFaridabadGurugramii. 2iii. 11000iv. Ms. Neena

Description : Explain four features of computer networks.

Last Answer : A computer network is interconnection of two or more computers connected to each other so that they can exchange information such as e-mail, messages or documents, or share resources such as disk storage or printer. ... Digital Network (ISDN). 4. Cable TV. 5. Digital Subscriber Line (DSL).

Description : Can you help enlighten me about terrorism threats to the US from Afghanistan?

Last Answer : War mongering hype/false news/ scare tactic. Makes it sound like a flotilla of C-5 aircraft loaded with jeeps and trucks ready to drop onto Missouri and parade into Kansas City Most of the articles ... ISIS and the Taliban don't necessarily get along well in the sandbox, to use a kindergarten image.

Description : How can I deal with the stress of constant street harassment and threats from men?

Last Answer : Get a car or use public transport, instead of walking alone down the street. Another option is to take self-defence lessons.

Description : Comunicating threats via facebook in South Carolina?

Last Answer : Call the police immediately. Print the posts so you have proof before he deletes them. Also report this to Face Book.

Description : Manipulative suicide threats?

Last Answer : answer:What gives you the right to monitor your brother's private online correspondences? Have some respect for his privacy. No wonder he's so aggressive and angry all the time. That said, you should ... himself tonight, you'll be able to deal with that now, too. Stop snooping on your brother.

Description : How long will the twin threats to the political system (Trump & Sanders) be tolerated?

Last Answer : answer:I think that people are taking the whole election process far too seriously this early. It’s August 2015 – thinks don’t even begin to make sense until March or April, and the conventions aren’t until next summer. It’s too early to worry about Trump and Sanders yet. Let the clowns play.

Description : Thoughts on North Korea's newest threats against the U.S.?

Last Answer : Empty chest pounding is what it is.