Chapter 1
Question 1
When solving problems, what is the first step?
Develop possible solutions
Recognize and define the problem
Analyze and compare the possible solutions
Select, implement and evaluate a solution
Question 2
The C.I.A. triad for computer security includes which of these characteristics?
availability
authorization
accountability
authentication
Question 3
A malware programs that hides its true nature, and reveals its designed behavior only when
activated is called a(n) ____________.
Trojan horse
Virus
Spam
Worm
Question 4