What critical component of any OS, that can be can be vulnerable to attacks, is used to store and manage information?

A. SQL database
B. file system
C. WSUS
D. NetBIOS


Answer: B

Computer Science & Information Technology

You might also like to view...

Modify the example program immediately preceding these practice problems to count from —10 to +10.

Replace LET n = 6 with LET n = —10

Computer Science & Information Technology

To run an unattended slide show in a continuous loop, click the Slide Show tab and then click the _____ button.

A. Browse at kiosk B. Loop Slides C. Set Up Slide Show D. none of the above

Computer Science & Information Technology

The core of the operating system is called the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following testing exercises are discussion-based only and don't involve deploying equipment or other resources

A. Functional exercises B. Full scale testing C. Tabletop exercise D. Plan audits

Computer Science & Information Technology