Questions from Business Communication


Q: What is the purpose of a disaster recovery plan? What are

What is the purpose of a disaster recovery plan? What are five major elements of a typical disaster recovery plan?

See Answer

Q: What is a computer virus? What is ransomware?

What is a computer virus? What is ransomware?

See Answer

Q: Explain how a denial-of-service attack works.

Explain how a denial-of-service attack works.

See Answer

Q: How does a denial-of-service attack differ from a

How does a denial-of-service attack differ from a distributed denial-of-service attack?

See Answer

Q: What is a disaster recovery firm? When and why would you

What is a disaster recovery firm? When and why would you establish a contract with them?

See Answer

Q: What is online backup?

What is online backup?

See Answer

Q: People who attempt intrusion can be classified into several different categories.

People who attempt intrusion can be classified into several different categories. Describe them.

See Answer

Q: There are many components in a typical security policy. Describe three

There are many components in a typical security policy. Describe three important components.

See Answer

Q: Some experts argue that thin-client client–server architectures are

Some experts argue that thin-client client–server architectures are really host-based architectures in disguise and suffer from the same old problems. Do you agree? Explain.

See Answer

Q: What are major aspects of intrusion prevention?

What are major aspects of intrusion prevention?

See Answer