Questions from Business Communication


Q: Some experts argue that CERT’s posting of security holes on its website

Some experts argue that CERT’s posting of security holes on its website causes more security break-ins than it prevents and should be stopped. What are the pros and cons on both sides of this argument...

See Answer

Q: What is one of the major risks of downloading unauthorized copies of

What is one of the major risks of downloading unauthorized copies of music files from the Internet (aside from the risk of fines and lawsuits)?

See Answer

Q: What is the term used to describe the placing of two or

What is the term used to describe the placing of two or more signals on a single circuit?

See Answer

Q: Although it is important to protect all servers, some servers are

Although it is important to protect all servers, some servers are more important than others. What server(s) are the most important to protect and why?

See Answer

Q: Explain the purpose of threat scenarios. What are the steps in

Explain the purpose of threat scenarios. What are the steps in preparing threat scenarios?

See Answer

Q: What is the purpose of the risk score, and how is

What is the purpose of the risk score, and how is it calculated?

See Answer

Q: What are the possible risk control strategies? How do we pick

What are the possible risk control strategies? How do we pick which one to use?

See Answer

Q: Why is it important to identify improvements that are needed to mitigate

Why is it important to identify improvements that are needed to mitigate risks?

See Answer

Q: What skill does a network manager need?

What skill does a network manager need?

See Answer

Q: Several important statistics related to network uptime and downtime are discussed in

Several important statistics related to network uptime and downtime are discussed in this chapter. What are they, and why are they important?

See Answer