We are somewhat limited in our ability to protect which type of data?
A. Data in use
B. Data at rest
C. Data in motion
Answer: A. Data in use
Computer Science & Information Technology
You might also like to view...
____ movies play animation well and play on both Macintosh and PC computers.
A. QuickTime B. Unix C. Windows Media D. Java
Computer Science & Information Technology
Which of the following IDS techniques seeks to prevent intrusions before they occur?
a. Infiltration b. Preemptive blocking c. Resource profiling d. Threshold monitoring
Computer Science & Information Technology
Which of the following is created by a programmer for use in an application.
A. ?Built-in objects B. ?Browser objects C. ?Document objects D. ?Customized objects
Computer Science & Information Technology
A(n) ____ reference refers to a fixed cell location that never changes.?
A. ?absolute B. ?relative C. ?template D. ?vector
Computer Science & Information Technology