A security template can be used to perform all but which of the following tasks?

a. Capture the security configuration of a master system
b. Apply security settings to a target system
c. Return a target system to its precompromised state
d. Evaluate compliance with security of a target system


Answer: c. Return a target system to its precompromised state

Computer Science & Information Technology

You might also like to view...

Select all that apply. Data structures that can dynamically store elements and can grow and shrink in size are

a. stacks b. arrays c. queues d. deques

Computer Science & Information Technology

Which is NOT one of the four key pieces of personal information you should protect from identity thieves?

A. Date of birth B. Street address C. Social Security number D. Anniversary

Computer Science & Information Technology

HTTP stands for _________________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The voice-family property is applicable only for aural user agents.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology