1 A passive t!reat to computer securit" is# $1% &alicious Intent $'% Sa(ota)e $*% Accident Errors $+% Espiona)e A)ents $,% -one of t!ese ' .!e Secure Electronic .ransaction $SE.% specification# $1% is a notice/ issued and verified (" a certificate aut!orit"/ t!at )uarantees a user or 0e( site is le)itimate $'% provides private1ke" encr"ption of all data t!at passes (etween a client and a server $*% allows users to c!oose an encr"ption sc!eme for t!e data t!at passes (etween a client and a server $+% uses a pu(lic1ke" encr"ption to secure credit1card transaction s"stems $,% -one of t!ese * 22222allows wireless mo(ile devices to access t!e Internet and its services suc! as t!e 0e( and e1mail# $1% .CP3IP $'% Et!ernet $*%0AP $+% .oken rin) $,% -one of t!ese + '4OS' flopp" disk does not !ave# $1% A Boot 5ecord $'% A 6ile Allocation .a(le $*% A 5oot 4irector" $+% 7irtual &emor" $,% BIOS , '&IC5' tec!nolo)" used for clearance of c!e8ues (" (anks refers to# $1% &a)netic Ink C!aracter 5eco)nition $'% &a)netic Intelli)ence C!aracter 5eco)nition $*% &a)netic Information Ca(le 5eco)nition $+% &a)netic Insurance Cases 5eco)nition $,% -one of t!ese 9 All t!e information collected durin) data(ase development is stored in a# $1% repositor" $'% data ware!ouse $*% 5A4 $+% CASE $,% -one of t!ese : .!e222222component is used (" t!e data anal"st to create t!e 8ueries t!at access t!e data(ase $1% data extraction $'% end1user 8uer" tool $*% end1user presentation tool $+% data store $,% -one of t!ese ; A$n%22222allows network users to s!are a sin)le cop" of software/ w!ic! resides on t!e network server $1% sin)le1user license a)reement $'% network site license $*% end1user license a)reement $+% (usiness software license $,% -one of t!ese < A pol"morp!ic virus# $1% modifies its pro)ram code eac! time it attac!es itself to anot!er pro)ram or file $'% is a malicious1lo)ic pro)ram t!at copies itself repeatedl" in memor" or on a disk drive until no memor" or disk space remains $*% a malicious1lo)ic pro)ram t!at !ides wit!in or looks like a le)itimate pro)ram $+% infects a pro)ram file/ (ut still reports t!e si=e and creation date of t!e ori)inal/ uninfected pro)ram $,% -one of t!ese 1> &icrowave transmission is used in environments w!ere installin) p!"sical transmission media is# $1% difficult or impossi(le and w!ere line1of1si)!t transmission is unavaila(le $'% eas" or promisin) and w!ere line1of1si)!t transmission is unavaila(le $*% difficult or impossi(le and w!ere line1of1si)!t transmission is availa(le $+% eas" or promisin) and w!ere line1of1si)!t transmission is availa(le $,% -one of t!ese 11 0!ic! is -O. a )ood 0e( securit" strate)"? $1% 5estrict access to t!e 0e( server@ keep a minimum num(er of ports open $'% Aimit t!e users w!o can load software/ edit or add files $*% Add demo pro)rams/ so users can test s"stem wit!out accessin) production data $+% 5emove unnecessar" compilers and interpreters $,% -one of t!ese 1' .!e alterin) of data so t!at it is not usa(le unless t!e c!an)es are undone is# $1% Biometrics $'% Compression $*% Encr"ption $+% Er)onomics $,% -one of t!ese 1* .!e word 6IP stands for# $1% 6ile .ranslate Protocol $'% 6ile .ransit Protocol $*% 6ile ."pin) Protocol $+% 6ile .ransfer Protocol $,% -one of t!ese 1+ 7oice mail# $1% is t!e exc!an)e of text messa)es and computer files transmitted via a communications network suc! as a local area network or t!e Internet $'% permits users to converse in real time wit! eac! ot!er via t!e computer w!ile connected to t!e Internet $*% functions muc! like an answerin) mac!ine/ allowin) callers to leave a voice messa)e for t!e called part" $+% involves usin) video and computer tec!nolo)" to conduct a meetin) (etween participants at )eo)rap!icall" separate locations $,% -one of t!ese 1, A communication processor t!at connects dissimilar networks (" providin) t!e translation from one set of protocol to anot!er is# $1% Brid)e $'% Gatewa" $*% 5outer $+% &odem $,% All of t!ese 19 0!ic! of t!e followin) is a )eneral1purpose pro)rammin) lan)ua)e/ desi)ned (" Sun &icros"stems/ and well suited for use on t!e 0e(? $1% 7B Script $'% Bava Script $*% CSS $+% Bava $,% -one of t!ese 1: .!istier processes C..P protocol/ scriptin) tasks/ performs calculations/ and provides access to data $1% Client $'% Applications30e( server $*% Enterprise server $+% 4BA $,% -one of t!ese 1; 5SA is# $1% S"mmetric Cr"ptos"stem $'% As"mmetric Cr"ptos"stem $*% Block C"p!er $+% 4i)ital Si)nature $,% -one of t!ese 1< A 47415A& is similar to a222222except it !as stora)e capacities up to ,' GB $1% C415 $'% flopp" disk $*% C4150 $+% !ard disk $,% -one of t!ese '> 0!en "ou are selectin) a mouse for a particular computer s"stem/ w!at is t!e most important consideration? $1% .!e t"pe of drivers t!at come wit! t!e mouse $'% .!e len)t! of t!e mouse cord $*% .!e t"pe of connector t!e mouse is e8uipped wit! $+% .!e num(er of (uttons t!e mouse !as $,% -one of t!ese '1 Cow is power supplied to a low1power DSB device? $1% .!rou)! a power ca(le $'% 6rom an external power suppl" $*% 4irectl" from t!e computer's power suppl" $+% .!rou)! t!e DSB ca(le $,% -one of t!ese '' All of t!e followin) are (asic principles of net works/ except# $1% eac! computer must !ave a network card $'% t!ere must (e communications media connectin) t!e network !ardware devices $*% t!ere must (e at least one connectin) device $+% eac! computer must !ave software t!at supports t!e movement of information $,% -one of t!ese '* .!e2222data minin) tec!ni8ue derives rules from real1world case examples $1% 5ule discover $'% Si)nal processin) $*% -eural nets $+% Case1(ased reasonin) $,% -one of t!ese '+ 22222are used to identif" a user w!o returns to a 0e(site $1% Cookies $'% Plu)1ins $*% Scripts $+% ASPs $,% -one of t!ese ', 0!ic! one of t!e followin) o(Eects is passed to a Bava Bean w!en one of its properties is set via a BSP action? $1% Servlet 5e8uest $'% Cttp Servlet 5e8uest $*% Servlet 5esponse $+% Cttp Servlet 5esponse $,% -one of t!ese Answers F 1 $1% ' $+% * $*% + $+% , $1% 9 $'% : $'% ; $'% < $1% 1> $+% 11 $+% 1' $*% 1* $1% 1+ $*% 1, $'% 19 $'% 1: $1% 1; $+% 1< $*% '> $*% '1 $+% '' $'% '* $*% '+ $1% ', $*%