Author Question: Which of the following refers to the three tiers in the three-tier architecture? A) TCP, IP, and ... (Read 32 times)

ss2343

  • Hero Member
  • *****
  • Posts: 548
Which of the following refers to the three tiers in the three-tier architecture?
 
  A) TCP, IP, and http
  B) html, XML, and JSON
  C) user, server, and database
  D) tunnel, switch, and access point

Question 2

What are the three general sources of security threats?
 
  What will be an ideal response?


djpooyouma

  • Sr. Member
  • ****
  • Posts: 325
Answer to Question 1

C

Answer to Question 2

A security threat is a challenge to the integrity of information systems that arises from one of three sources: human errors and mistakes, computer crime, and natural events and disasters. Human errors and mistakes include accidental problems caused by both employees and nonemployees. Computer crime includes employees and former employees who intentionally destroy data or other system components. It also includes hackers who break into a system and virus and worm writers who infect computer systems. Natural events and disasters include fires, floods, hurricanes, earthquakes, tsunamis, avalanches, and other acts of nature. Problems in this category include not only the initial loss of capability and service, but also losses stemming from actions to recover from the initial problem.



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question


 

Did you know?

Carbamazepine can interfere with the results of home pregnancy tests. If you are taking carbamazepine, do not try to test for pregnancy at home.

Did you know?

Your chance of developing a kidney stone is 1 in 10. In recent years, approximately 3.7 million people in the United States were diagnosed with a kidney disease.

Did you know?

Addicts to opiates often avoid treatment because they are afraid of withdrawal. Though unpleasant, with proper management, withdrawal is rarely fatal and passes relatively quickly.

Did you know?

Though newer “smart” infusion pumps are increasingly becoming more sophisticated, they cannot prevent all programming and administration errors. Health care professionals that use smart infusion pumps must still practice the rights of medication administration and have other professionals double-check all high-risk infusions.

Did you know?

Throughout history, plants containing cardiac steroids have been used as heart drugs and as poisons (e.g., in arrows used in combat), emetics, and diuretics.

For a complete list of videos, visit our video library