The International Organization for Standardization has developed two documents (____), which describe, in detail, the recommended standards to secure computer resources.
ISO 17799 and ISO 27002
As a defensive and offensive measure to protect against malicious software, install and run ____ software and keep it current.
When you are responsible for the security of a computer or small network, make it a habit to check every computer for which you are responsible every day.
A ____ virus is a combination of a boot sector virus and a file virus and can hide in either.
A(n) ____ account has complete access to the system and can make changes that affect the security of the system and other users.
A(n) ____ account has read-write access only on its own folders, read-only access to most system folders, and no access to other users' data
A ____ is assigned by a Certification Authority, and is used to prove you are who you say you are.
A(n)____ password means it is not easy to guess by both humans and computer programs designed to hack passwords.
A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination.
Folders and files stored on a workstation or server that contain user data need to be classified as to the ____ assigned to the data.
Internet Explorer includes the pop-up blocker, the ability to manage add-ons, the ability to block scripts and disable scripts embedded in Web pages, and the ability to set the general security level.
Generally speaking, the weakest link in setting up security in a computer environment is ____.
For the health care industry, the ____ includes regulations to secure patient data that apply to all health care companies and professionals.
A network ____ map is one of the most powerful and versatile methods of communicating over a network.
Because of the problem of losing encrypted data and Internet passwords when a user password is reset, each new user should create a password ____ disk for use in the event the user forgets the password.
A Trojan sometimes installs a ____ in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed.
Most hard drive manufactures offer a ____ is used to wipe clean all data on the drive.