Which of the following DoS security category specifies that the TCB protection system should be mandatory, not discretionary?

a. Category A
b. Category B
c. Category C
d. Category D


ANS: B

Computer Science & Information Technology

You might also like to view...

When using MLA style, the bibliography is referred to as the works cited page

Indicate whether the statement is true or false

Computer Science & Information Technology

Match each aggregate function with the value it returns:

I. Avg II. Count III. Maximum IV. Minimum V. Sum A. Returns the data item with the highest value B. Returns the data item with the lowest value C. Returns the mean value of a group of numbers D. Returns the total value of a column of numbers E. Returns the number of fields containing data

Computer Science & Information Technology

Context-sensitive commands are displayed by ________

A) shortcut menus B) ScreenTips C) dialog boxes D) content panes

Computer Science & Information Technology

Critical Thinking Questions Case 8-2 ? You have had some limited experience developing HTML code but you have never had the responsibility for transferring a finished site to its home on a remote site. You need to familiarize yourself with the methods and the protocols for doing so. ? For one client, you are looking for a protocol that will permit users to edit and manage files collaboratively on a remote web server. Which of the following are you most likely to use? a.FTPc.Local/Networkb.Intranetd.RDS and WebDAV

What will be an ideal response?

Computer Science & Information Technology