To evaluate the performance of a security system, administrators must establish system performance __________.

A. baselines
B. profiles
C. maxima
D. means


Answer: A

Computer Science & Information Technology

You might also like to view...

To append data to an existing file, you open it with the ____________ method.

a. File.Append b. File.AppendAll c. File.AppendText d. File.OpenExistingText

Computer Science & Information Technology

Each click on the stage with the Pen Tool creates a(n) ____ point.

a. direction b. corner c. anchor d. orientation

Computer Science & Information Technology

Case B-2Sophie has just completed a Web design course using Dreamweaver, where she learned basic design principles. She has been asked to evaluate the website of a local small business and make suggestions to improve the site. Sophie notices that the site name includes uppercase letters. What does she explain to the business owner concerning the use of uppercase letters?

A. It is not acceptable to use uppercase letters in the site name. B. It is acceptable to use uppercase letters in the site name. C. It is only acceptable to use uppercase letters in a filename. D. It is only acceptable to use uppercase letters in a folder name.

Computer Science & Information Technology

What do the last 64 bits of a global unicast address look like?

What will be an ideal response?

Computer Science & Information Technology