__________ is a strategy of using multiple types of technology that prevent the failure of one system from compromising the security of information.

A. Firewalling
B. Hosting
C. Redundancy
D. Domaining


Answer: C

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

a) The VISA Invoice Specification enables commercial credit-card users to maintain and leverage more detailed information on credit-card purchases. b) Client and server applications can use BIPS to communicate payment instructions over the Internet. c) cXML is an acronym for Cash XML d) An XBRL document contains three elements: group, items and label. e) XUL was created by Microsoft

Computer Science & Information Technology

Someone who breaks into computer systems to create mischief or steal information is a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

A predesigned set of fonts, colors, and fill effects that look good together is a ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Project ____ requires guiding, supervising, and coordinating the project team's workload.

A: planning B: scheduling C: monitoring and controlling D: reporting

Computer Science & Information Technology