Answer:
1. True 2. False 3. True 4. True 5. True 6. False 7. True
Explanation:
1. A hacker/cracker finds and exploits weakness in order to gain access with a criminal intent, just as an intruder.
2. Activists are people who campaign to bring about a positive political or social change.
3. It is illegal to use a device as a packet sniffer to steal people's usernames and passwords.
4. This quite true, as there is a huge community of hackers where people are highly recognized for hacking.
5. Yes, intruders have a common attack methodology.
6. IDS monitors networks or systems to identify suspicious activities while a user interface is the means the computer and the user interacts. So it's false.
7. instrusion detection involves monitoring networks or systems to identify suspicious activities, so an intruder is detected if their behavior is suspicious when compared to a legitimate user.
Answer: SETA program
Explanation:
The SETA program is basically stand for the security, education, training and awareness. It is basically used to reduce the accidental security which is break by the organization member such as employees, vendors and contractors.
The SETA program provided various benefits to the organization as it improve the behavior of the employees.It basically enhance the training and education program by focus and concentrate on the information security.
It can also inform he member of the organization about the report of violating many policies.
<span>Format ribbon. the ribbon containing options for formatting fonts. One can change case, style, bold, italics, underline etc using the short cut keys in the format ribbon or using the menu options provided in the ribbon. It is common for microsoft word or excel applications.</span>
Answer:
it is 125.510$ per yr but try B see if its correct
Answer: D. enter each major point from the outline on a separate line