Which of the following is a network's ability to detect attacks when they occur and to evaluate the extent of damage and compromise?
A. resistance
B. recovery
C. recognition
D. reliability
Answer: C
You might also like to view...
The size of an ellipse drawn using the FillEllipse method is specified in ________.
a) points b) pixels c) centimeters d) dialog units e) inches
Answer the following statements true (T) or false (F)
1) An attribute that begins with a single underscore is a private attribute. 2) The destructor is called when the keyword del is used on an object. 3) A shared class attribute should be initialized in the constructor. 4) When invoking an object’s method, a program does not need to pass a value that corresponds to the object reference parameter. 5) Every class should have a __del__ method to reclaim an object’s memory.
________ printers use a technology similar to that used in a photocopying machine.
A. Laser B. Thermal C. Cloud D. Dot-matrix
The __________ is an intermediate area between a trusted network and an untrusted network.
A. perimeter B. DMZ C. domain D. firewall