What critical component of any OS, that can be can be vulnerable to attacks, is used to store and manage information?
A. SQL database
B. file system
C. WSUS
D. NetBIOS
Answer: B
Computer Science & Information Technology
You might also like to view...
Modify the example program immediately preceding these practice problems to count from —10 to +10.
Replace LET n = 6 with LET n = —10
Computer Science & Information Technology
To run an unattended slide show in a continuous loop, click the Slide Show tab and then click the _____ button.
A. Browse at kiosk B. Loop Slides C. Set Up Slide Show D. none of the above
Computer Science & Information Technology
The core of the operating system is called the ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which of the following testing exercises are discussion-based only and don't involve deploying equipment or other resources
A. Functional exercises B. Full scale testing C. Tabletop exercise D. Plan audits
Computer Science & Information Technology