A.Assures that information and programs are changed only in a specified and authorized manner.
B.The data stored on a computer is the same as the source documents.
C.Information should be accessible and useable upon appropriate demand by an autho
A.Dormant Phase:
B.Propagation Phase:
C.Triggering Phase:
D.Destroy Phase
A.We can classify viruses depending on the type of target the virus tries to infect
B.We can classify viruses depending on the the method the virus uses to conceal itself from detection by users and antivirus software.
C.Boot sector infector: Inf
A.These programs are memory-resident programs
B.These programs identify a virus not by its actions but by the structure in an infected program.
C.These programs have the advantage that it is not necessary to develop signatures
D.These programs
A.Prevention against integrity of the asset
B.Security is the protection of assets.
C.Detection of threat to integrity to the asset
D.Re-action if security is breached
A.Information can be stolen - but you still have it
B.Confidential information may be copied and sold - but the theft might not be detected
C.The criminals may be on the other side of the world
D.It requires highly trained and skilled person to
A.Software, especially application software, is often easy to delete, Software can also be altered or damaged to render it useless.
B.Careful software configuration management, which includes making backups of the most recent version of software, c
A.正确
B.错误
A.正确
B.错误
A.正确
B.错误