Which of the following is not a security attack?
A. DoS attack
Back door
C. Phishing
D. Thread
Which of the following is a technique that uses a Web page that looks like an official part of some trusted environment?
A. DoS attack
B. Phishing
C. Back door
D. Man-in-the-middle attack
Which of the following is right?
A. DoS attack is network-based
B. Man-in-the-middle attack is network-based
C. Spoofing is an attack that allows one user to disguise as another
D. All of the above
Fill in the numbered spaces with the words or phrases chosen from the box. Change the forms where necessary.Symantec—Computer Security Solutions LeaderSymantec’s programmers1 _every lie of code, rewrote programs, and 2 a new security model tocreate itslatest3 of Norton AntiVirus and Norton Internet Security. The results are programs that useless hard disk pace, decrease starting and scanning time, and __4less than 7 MB of memory.The more than 100 performance improvementsoffer5 protection formillions of computer users6 .TheCalifornia-based companyis one of the ten largest software corporations in the world. It was founded in 1982 and has7in more than 40 countries. Its primary manufacturing facilityis8 in Dublin, Ireland.Symantecrecently9the latestversion of its Norton Internet Security software. A ratingservice tested he level of protection10by 10 different security products and gave Norton Internet Security the only perfect score.