DoS attacks are used to destroy information and access restricted areas of a company's information system.
Indicate whether the statement is true or false
Q. 2All of the following statements regarding IBM Notes are true except which one?
A) It began as an e-mail and messaging client.
B) It is a widely used collaboration tool at larger firms.
C) It provides capabilities for wikis and microblogging.
D) It provides tools for full version control of all company documentation.
E) It is designed to provide security for sensitive corporate information.
Q. 3________ is a component of a web address that maps to the unique IP address of the destination location.
A) Protocol identifier
B) File protocol
C) Registered domain name
D) Fragment identifier
Q. 4A(n) ________ organizes data in two-dimensional tables.
A) non-relational DBMS
B) mobile DBMS
C) relational DBMS
D) hierarchical DBMS
E) object-oriented DBMS
Q. 5________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
A) A legal safe harbor
B) The opt-in model
C) The FIP set of guidelines
D) P3P
Q. 6Digitization of intellectual property (IP) results in better enforcement of IP laws.
Indicate whether the statement is true or false
Q. 7________ uses statistical techniques to explore a data warehouse and hunt for hidden patterns and relationships that are undetectable in routine reports.
A) Data mining
B) Data extracting
C) Data modeling
D) Data normalizing
Q. 8Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.
Indicate whether the statement is true or false