WIRELESS NETWORKS AND MOBILE IP
WIRELESS NETWORKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Shared files and resources
|
|
Less vulnerable to hackers
|
|
Data can be shared across a range of users
|
|
User accounts can be created
|
Detailed explanation-1: -3. From the options below, which of them is not a vulnerability to information security? Explanation: Flood comes under natural disaster which is a threat to any information and not acts as a vulnerability to any system.
Detailed explanation-2: -Explanation: The advantages are minimization of computer freezing and crashes, user privacy, and protection against viruses, worms, etc. Disadvantages include the system becoming slow, configuring firewalls correctly can be difficult, need to update the new software in order to keep security up to date.
Detailed explanation-3: -The four main types of vulnerabilities in information security are network vulnerabilities, operating system vulnerabilities, process (or procedural) vulnerabilities, and human vulnerabilities.