Mark as Final and Encrypt with Password are two ________ options

A) Defensive Actions B) Protect Presentation
C) Presentation Security D) Lock Presentation


B

Computer Science & Information Technology

You might also like to view...

Which of the following will call a function named setBlue() when a text box with id = "blue" gets the focus?

a. ``` onfocus = "blue" onclick = ("setBlue()"); ``` b. ``` onfocus.blue = setBlue() ``` c. ``` id = "blue" onclick = setBlue() ``` d. ``` onfocus = "setBlue('blue')" ```

Computer Science & Information Technology

To use a packet sniffer legally, an administrator only needs permission of the organization's top computing executive.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Referring to the figure shown here, what is the name of the security control indicated by the arrow?

A. Mantrap B. Intrusion prevention system C. Turnstile D. Portal

Computer Science & Information Technology

A company has been attacked and their website has been altered to display false information. The security administrator disables the web server service before restoring the website from backup. An audit was performed on the server and no other data was altered. Which of the following should be performed after the server has been restored?

A. Monitor all logs for the attacker's IP B. Block port 443 on the web server C. Install and configure SSL to be used on the web server D. Configure the web server to be in VLAN 0 across the network

Computer Science & Information Technology