Which of the following is a network's ability to detect attacks when they occur and to evaluate the extent of damage and compromise?

A. resistance
B. recovery
C. recognition
D. reliability


Answer: C

Computer Science & Information Technology

You might also like to view...

The size of an ellipse drawn using the FillEllipse method is specified in ________.

a) points b) pixels c) centimeters d) dialog units e) inches

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1) An attribute that begins with a single underscore is a private attribute. 2) The destructor is called when the keyword del is used on an object. 3) A shared class attribute should be initialized in the constructor. 4) When invoking an object’s method, a program does not need to pass a value that corresponds to the object reference parameter. 5) Every class should have a __del__ method to reclaim an object’s memory.

Computer Science & Information Technology

________ printers use a technology similar to that used in a photocopying machine.

A. Laser B. Thermal C. Cloud D. Dot-matrix

Computer Science & Information Technology

The __________ is an intermediate area between a trusted network and an untrusted network.

A. perimeter B. DMZ C. domain D. firewall

Computer Science & Information Technology