Which of the following ratings would you assign to a system that has no confidential or sensitive data on it?

a. 1
b. 3
c. 5
d. 10


ANS: A

Computer Science & Information Technology

You might also like to view...

Your friend sees an error message during Windows startup about a corrupted bootmgr file. He has another computer with a matching configuration and decides to copy the bootmgr file from the working computer to the computer with the problem. Where can he locate the bootmgr file?

A. C:\Boot\bootmgr B. System Reserved\Boot\bootmgr C. System Reserved\bootmgr D. All of the above

Computer Science & Information Technology

A computer that is controlled by a hacker or other computer criminal is referred to as a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following formatting options are available for text inside a shape?

A. font B. font color C. alignment D. font size

Computer Science & Information Technology

In 1991, a student at the University at Helsinki created an open source version of UNIX called __________ designed to run on the Intel 386 chip, the precursor to today’s Pentium family of chips.

a. Linux b. UNIX-H c. open UNIX d. DOS

Computer Science & Information Technology