Examlex
A computer virus consists of segments of code that perform ____________________ actions.
NFC
Near Field Communication, a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within close proximity.
Protocols
Sets of rules and conventions for communication between network devices, ensuring the transfer of data across networks is consistent and reliable.
BIOS
Basic Input Output System, firmware used to perform hardware initialization during the booting process and to provide runtime services for operating systems and programs.
Boot Sequence
The order of operations that a computer's BIOS follows to load the operating system and other software when the computer is turned on.
Q23: The _ packet-filtering firewall allows only a
Q34: A(n)_ is a malicious program that replicates
Q35: The actions taken during and after a
Q36: The _ entails a detailed examination of
Q43: _ presents a comprehensive information security model
Q47: Studies on ethics and computer use reveal
Q64: _ and TACACS are systems that authenticate
Q77: Some argue that it is virtually impossible
Q78: An attack _ is a detailed description
Q80: An alert or intrusion is an indication