Notice: Payments for answers will end 4/10/2017. Click for more info.
You have new items in your feed. Click to view.
Question and answer
Q: Malware authors have many ways to get around antivirus engines. Which one of the following would not be an effective technique? a. File compression b. File encryption c. Metamorphic
techniques d. Hotfixing
A: AVG is great Anit virus software.
Get an answer
Original conversation
User: Malware authors have many ways to get around antivirus engines. Which one of the following would not be an effective technique? a. File compression b. File encryption c. Metamorphic techniques d. Hotfixing

Weegy: AVG is great Anit virus software.
ducthangbk|Points 20|

User: The AIAP is a stand-alone program. a. TRUE b. FALSE

User: Which pre-hacking phase could be accomplished without the attacker ever connecting to the target network? a. Enumeration b. Scanning c. Foot-printing d. None, as the attacker must connect to accomplish all three.

User: What are the factors institutionalized by the Army for hazard identification? a. CIA Triad b. METTC-FC c. Qualitative d. Quantitative

User: Which pre-hacking phase could be accomplished without the attacker ever connecting to the target network? a. Enumeration b. Scanning c. Foot-printing d. None, as the attacker must connect to accomplish all three.

User: Which is an example of a technical control? a. Identification and Authentication Systems b. Security Policy c. Electronic Documentation d. Security Guard

User: The _____________ is responsible for ensuring that each assigned DoD information system has a designated Information Assurance Manager (IAM) with the support, authority and resources to satisfy the responsibilities established in DoDI 8500.2 and the DIACAP a. Designated Approving Authority b. Program or System Managers c. User Representative d. Systems Administrator

User: The Symantec Endpoint Protection engine, used to scan files, folders, and memory locations for different types of malware, is a good example of a _________-based intrusion detection/prevention software. a. Hardware b. Harddrive c. Network d. Host

User: In asymmetric encryption, normally how many keys are utilized? a. 1 b. 2 c. 3 d. 4

User: An ATM card is an example of which type of authentication? a. Something known b. Something you have c. Something you are d. Multifactor Authentication

Weegy: d. Multifactor Authentication
peanut213|Points 130|

User: Designating the Hard Disk as the only bootable device increases system security because: a. Hard drives provide the best media performance, enhancing availability b. Alternative media won’t boot with alternative operating systems c. Reduces overall boot time d. Prevents booting from system RAM

Weegy: d. Prevents booting from system RAM
Expert answered|chubang|Points 351|

Question
Asked 8/28/2012 7:06:10 AM
0 Answers/Comments
New answers
Rating

There are no new answers.

Comments

There are no comments.

Add an answer or comment
Log in or sign up first.
Questions asked by the same visitor
Sarcasm: A. is a form of humor that teachers can use to motivate students. B. is only appropriate to use in middle school classrooms. C. is funny and makes students laugh at themselves. D. can embarrass students and is never appropriate for a teacher to use.
Question
Not Answered
Updated 78 days ago|2/6/2018 2:54:12 PM
1 Answer/Comment
Sarcasm can embarrass students and is never appropriate for a teacher to use.

Added 78 days ago|2/6/2018 2:54:12 PM
This answer has been added to the Weegy Knowledgebase
Confirmed by selymi [2/7/2018 8:22:27 AM], Unconfirmed by selymi [2/7/2018 8:23:34 AM]
Which are examples of information that should NEVER be posted on a public website? a. Sensitive Acquisition or contractual information b. Personally Identifiable Information (PII) c. Information regarding incidents under investigation d. All of the above
Question
Not Answered
Updated 8/27/2012 11:21:28 AM
1 Answer/Comment
Which are examples of information that should NEVER be posted on a public website? d. All of the above
Added 8/27/2012 11:21:28 AM
This answer has been confirmed as correct and helpful.
Confirmed by Janet17 [5/26/2014 7:21:11 AM]
The AIAP is a stand-alone program. a. TRUE b. FALSE
Weegy: Asked 2 The AIAP is a stand-alone program. FALSE. User: Establishing an incident response capability includes? a. Create an incident response policy and training the response team b. Develop procedures for performing incident handling and reporting c. Setting communication guidelines and identifying key personnel d. All of the above Weegy: ALL OF THE ABOVE. Establishing an incident response capability includes - Create an incident response policy and training the response team, Develop procedures for performing incident handling and reporting and Setting communication guidelines and identifying key personnel. (More)
Question
Expert Answered
Updated 12/29/2016 12:11:12 AM
1 Answer/Comment
The computer fraud and abuse act was passed in 1986 to combat? a. Wiretapping b. Non-cost effective computer security c. Identity theft d. Hacking
Weegy: Wiretapping (More)
Question
Expert Answered
Updated 11/29/2014 11:07:35 AM
1 Answer/Comment
The computer fraud and abuse act was passed in 1986 to combat: Hacking.

Added 11/29/2014 11:07:35 AM
This answer has been confirmed as correct and helpful.
Confirmed by sujaysen [11/29/2014 12:47:12 PM]
26,822,556 questions answered
Popular Conversations
What does throttle mean?
4/16/2018 10:25:30 AM| 5 Answers
How many amino acids are there? A. Three B. Seven C. ...
Weegy: Amino acids are organic compounds that combine to form proteins.
4/20/2018 7:55:39 AM| 3 Answers
Solve 7(x - 3) = -70.
Weegy: Step 1. 5x-10-3x+12=10 Step 2. 2x+2=10 Step 3. 2x=8 ...
4/20/2018 11:45:54 AM| 3 Answers
Ancient cyanobacteria released ______, which assisted in creating the ...
Weegy: Cyanobacteria, is a phylum of bacteria that obtain their energy through photosynthesis. User: The epoch in ...
4/16/2018 10:31:53 AM| 3 Answers
What is the double jeopardy principle
Weegy: Principle is a law or rule that has to be, or usually is to be followed, or can be desirably followed, or is an ...
4/19/2018 6:55:12 PM| 3 Answers
Binary star
Weegy: Binary means composed of two pieces or two parts. User: Constellations
4/24/2018 12:12:08 PM| 2 Answers
Which sentence does not contain misplaced or dangling modifiers? ...
Weegy: The sentence that does not contain misplaced or dangling modifier is:
4/15/2018 8:58:11 PM| 2 Answers
Define impressionism
4/15/2018 9:53:48 PM| 2 Answers
What’s 307,495 rounded to the nearest thousand
Weegy: 307,495 rounded to the nearest thousand is 307,000. User: Which of the following statements about the number ...
4/20/2018 6:40:52 PM| 2 Answers
Find the next term for sequence 9, 6, 4
4/20/2018 9:05:24 PM| 2 Answers
Weegy Stuff
S
P
L
P
P
P
P
Points 246 [Total 672] Ratings 0 Comments 246 Invitations 0 Offline
S
R
L
R
Points 231 [Total 369] Ratings 0 Comments 31 Invitations 20 Offline
S
1
L
L
P
R
P
L
P
P
R
P
R
P
R
Points 218 [Total 13021] Ratings 0 Comments 208 Invitations 1 Offline
S
L
Points 97 [Total 97] Ratings 1 Comments 57 Invitations 3 Offline
S
L
Points 93 [Total 93] Ratings 0 Comments 33 Invitations 6 Offline
S
Points 71 [Total 71] Ratings 0 Comments 21 Invitations 5 Offline
S
Points 50 [Total 50] Ratings 0 Comments 0 Invitations 5 Offline
S
P
L
Points 35 [Total 126] Ratings 0 Comments 35 Invitations 0 Offline
S
Points 30 [Total 35] Ratings 3 Comments 0 Invitations 0 Offline
S
P
Points 24 [Total 68] Ratings 0 Comments 24 Invitations 0 Offline
* Excludes moderators and previous
winners (Include)
Home | Contact | Blog | About | Terms | Privacy | © Purple Inc.