What network protocol do Linux and Apple (Macintosh) systems most commonly use today?
A. AppleTalk
B. NetBIOS/NetBEUI
C. IPX/SPX
D. TCP/IP
Answer: D
You might also like to view...
Which of the following PCI compliance validation levels includes requirements that are set by the merchant bank?
A) Level 1 B) Level 2 C) Level 3 D) Level 4
Answer the following statements true (T) or false (F)
1. Security has three interrelated aspects: physical, logical, and behavioral. As long as at least two aspects are in place, the quality of security is considered high. 2. Passwords and authorization codes are examples of logical security controls. 3. A firewall constructs a barrier between an internal network and an intranet. 4. A firewall is attack-proof.
____ planning ensures that critical business functions can continue if a disaster occurs.
A. Business response B. Business continuity planning C. Incident response D. Disaster recovery
Suppose that index is an int variable. The statement index = index + 1; is equivalent to index++;
Answer the following statement true (T) or false (F)