All of the behaviors that the creators of the EBK deemed necessary to ensure fundamentally proper security were categorized into ____ competency areas.

A. 10
B. 12
C. 14
D. 16


Answer: C

Computer Science & Information Technology

You might also like to view...

Windows operating systems have which of the following security ratings?

A) C1 B) C2 C) B1 D) B2

Computer Science & Information Technology

Memory management is concerned with __________.

a. managing the system’s memory resources as the computer runs b. allocating space to applications as needed c. ensuring that applications do not interfere with each other d. all of the above

Computer Science & Information Technology

You can create a bitmap graphic from the kind of graphic shown in the accompanying figure through a process called ____.

A. gradation B. pixel interpolation C. tracing D. rasterization

Computer Science & Information Technology

___________ is the obligation not to disclose willingly any information that should be kept private.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology