We are somewhat limited in our ability to protect which type of data?

A. Data in use
B. Data at rest
C. Data in motion


Answer: A. Data in use

Computer Science & Information Technology

You might also like to view...

____ movies play animation well and play on both Macintosh and PC computers.

A. QuickTime B. Unix C. Windows Media D. Java

Computer Science & Information Technology

Which of the following IDS techniques seeks to prevent intrusions before they occur?

a. Infiltration b. Preemptive blocking c. Resource profiling d. Threshold monitoring

Computer Science & Information Technology

Which of the following is created by a programmer for use in an application.

A. ?Built-in objects    B. ?Browser objects C. ?Document objects D. ?Customized objects

Computer Science & Information Technology

A(n) ____ reference refers to a fixed cell location that never changes.?

A. ?absolute B. ?relative C. ?template D. ?vector

Computer Science & Information Technology