Name two other means of online security measures. -Technology

1 Answer

Answer :

Digital signature and Digital certificate

Related questions

Description : What are the various measures that should be taken to prevent spyware from overtaking your system? -Technology

Last Answer : Preventions of SpywareDue to the seriousness of spyware and the harm, it can affect your system and personal information, it is highly recommended you to take the given measures to prevent ... and are capable of blocking suspicious traffic, which can prevent spyware from infecting your system.

Description : Duplication of data is known as (a) data security (b) data incomplete -Technology

Last Answer : (c) Data redundancy means duplication of data. It eliminates replication of data item into different files from a large database.

Description : ………….. feature is available in Windows 7 ultimate for data security. -Technology

Last Answer : BitLocker Data Protection feature is available in Windows 7 ultimate for data security.

Description : Which security provision is used to ensure data integrity and authentication? -Technology

Last Answer : A digital signature helps the user to ensure data integrity and authentication.

Description : Define information security. -Technology

Last Answer : Information security is all about protecting and preserving information. It’s all about protecting and preserving the confidentiality, integrity, authenticity, availability, and reliability of information.

Description : ………. security technology establishes an encrypted link between a Web server and browser. -Technology

Last Answer : SSL security technology establishes an encrypted link between a Web server and browser.

Description : Cracker is a person who breaks security to see what we have stored on our computers with mat intentions. -Technology

Last Answer : True Cracker breaks security with mal intentions.

Description : Write down the major issues of security and integrity of information. -Technology

Last Answer : There are three major issues as follows:1. Confidentiality2. Integrity3. Availability

Description : IT security today has become a major point of concern. What comes under IT security? -Technology

Last Answer : IT security is a term which is more concerned with the protection of hardware,software and a network of an organisation, from the perils of disaster and external attacks through virus, hacking etc.

Description : Making backups, keeping passwords and having access control are used for ………….. (a) Data security -Technology

Last Answer : (a) Backups, access authorised are the techniques to secure data from damage and getting lost.

Description : The term is used to represent_“information is accurate and complete” (a) Security (b) Integrity (c) Completeness (d) Counterfeiting -Technology

Last Answer : (b) Integrity means information is accurate and complete.

Description : i. select city from training where topic = 'Cyber Security'; -Technology

Last Answer : i. New DelhiFaridabadGurugramii. 2iii. 11000iv. Ms. Neena

Description : Explain in brief any 2 security threats to computer networks. -Technology

Last Answer : Two security threats to computer networks are as follows :1. Computer worm It is a standalone malware computer program that replicates itself in order to spread to other computers.2. Spam It is flooding the Internet with many copies of the same message.

Description : Why would a sewage treatment plant need security measures?

Last Answer : Protection from sabotage, protection from juvenile pranks.

Description : Are the new TSA security measures unconstitutional? Is flying a right, or a privilege?

Last Answer : Absolutely. If it were a right, you could not be charged for it.

Description : What's the reason for different security measures when making credit purchases?

Last Answer : It will probably have to do with the various store’s relationship with their banks and card companies as well as their indemnity insurance rules.

Description : When employing local national support appropriate security measures should be taken?

Last Answer : Ensure that contracted linguists do not jeopardize operationsthrough espionage.

Description : When using social media are security measures you should follow Select all that apply.?

Last Answer : What is the answer ?

Description : Which notebook computers have the best security measures?

Last Answer : Ones provided with antivirus and anti-malware programs in them. PC laptops and apple notebooks are recommended as long as they have the correct antivirus and antimalware program.

Description : Frequencyof failure and network recovery time after a failure are measures of the_______of a network. A) Performance B) Reliability C) Security D) Feasibility

Last Answer : Reliability

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : what is the primary goal of an Ethical Hacker ?  Avoiding detection  Testing security controls  Resolving security vulnerabilities  Determining return on investment for security measures

Last Answer :  Resolving security vulnerabilities

Description : What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness? a. Risk management b. Risk assessment c. Security d. None of the above

Last Answer : a. Risk management

Description : Which measures the systematic or non -systematic risk of a security ? a. Beta c. standard deviation b. Variance d. Range

Last Answer : Answer :a

Description : OS' computer abbreviation usually means ? -Technology

Last Answer : OS computer Abbreviation usually means OPERATING SYSTEM. An Operating system is an integrated set of programs that are used to manage the various resources and overall operations of a computer system.

Description : Downloading of files means transferring files from host computer to the Internet. -Technology

Last Answer : False Downloading of files means transferring of files from an Internet to your computer.

Description : The tag is an ………… tag, that means it has no closing tag. -Technology

Last Answer : The tag is an emptytag, that means it has no closing tag.

Description : ……………. means that a printed document is exactly a copy of what you see on screen. -Technology

Last Answer : WYSIWYGmeans that a printed document is exactly a copy of what you see on screen.

Description : Valid XML document means -Technology

Last Answer : (c) Valid XML document checks errors and has DTD or schema and compiles to it.

Description : Well_formed XML document means -Technology

Last Answer : (d) Well-formed XML document must contain one or more elements and root element must contain all other elements.

Description : Word wrapping means (a) the text remains in the straight line -Technology

Last Answer : (b) Word wrapping distributes the text in multiple lines.

Description : Intellectual property right means that the person who produces the information is the only one who can use that information. Now, -Technology

Last Answer : The intellectual property rights must be protected because protecting them:1. encourages individuals and business to create new software and new software applications, as well as improving existing ... new ideas and technologies are widely distributed.3. promotes investment in the national economy.

Description : Cell address $5 in a formula means (a) it is a mixed reference -Technology

Last Answer : (b) $ sign in a formula need to add before row number and column letter for absolute referencing.

Description : Secrecy means that we can share the personal information of an individual with anyone. -Technology

Last Answer : FalseSecrecy means we should share the personal information of an individual only with authorised persons.

Description : Valid XML document means (a) The document has one root element -Technology

Last Answer : Valid XML document meansThe document has a DTD and complies to it

Description : NULL value means : (i) 0 value (ii) 1 value (iii) None value (iv) None of the above -Technology

Last Answer : Correct option (d) None value

Description : This instrument measures temperatures by electric means, especially temperatures beyong the range of mercury thermometers

Last Answer : pyrometer

Description : On a wireless home security system, can you mix and match cameras from different brands or styles?

Last Answer : It depends on the software of the system controller. Not all cameras will have the same functionality that the controller is expecting to see. Let me give an example: Let's say that ... language among all security systems and cameras that would ensure the interoperability that you are asking about.

Description : Blackberry Playbook password security?

Last Answer : Assuming you have the latest software these instructions were lifted straight from the manual. 1. On the home screen, swipe down from the top frame. 2. Tap Security > Password. To set a password, set ... switch to On. To change your password, tap Change Password. 3.Complete the fields. 4.Tap OK.

Description : What's a good way to learn network security?

Last Answer : You could go to your local bookstore and buy a book. I’ve probably walked by hundreds of network security books at Barnes & Noble.

Description : The ambulance is moving toward you and your sound technology measures the pitch at 645 hertz. The speed of the ambulance is therefore ______ m/s.?

Last Answer : *this is the full question not the answer* Suppose you’re standing on a sidewalk and down the street is an ambulance parked; it’s siren is a 600 Hz sound like it louder, Quieter, louder, quieter ... do use the facts given above to answer this:The ambulance is moving toward you and your sound te

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : a) Confidentiality

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : b) Integrity

Description : Collateral Security in Business means 1. Additional or Supporting security 2. No security 3. Security in the form of Gold 4. Security for top executives 5. None of these

Last Answer : Additional or Supporting security

Description : What is Food security means: (a) availability of food (b) accessibility of food (c) affordability of food (d) all the above

Last Answer : (d) all the above

Description : Which of the following simply means to hardware or software load over web servers, that improver's the efficiency of the server as well as the application? A. Amazon Cloud-front B. Elastic Load Balancer C. Load Balancing D. Security Management

Last Answer : Load Balancing

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity

Last Answer : A) Confidentiality

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity

Last Answer : B) Integrity

Description : In IT, means that the data available in the database is both accurate and consistent. (1) Data Security (2) Data Availability (3) Data Binding (4) Data Integrity

Last Answer : Data Integrity