The W5HH principle contains which of the following questions?A) Why is the system being developed? B) What will be done by whom?C) Where are they organizationally located?D) How much of each resource is required?
What will be an ideal response?
A, C, D
You might also like to view...
Which of the following configuration passes is applied during the portion of the installation where users are asked for information after the second reboot?
A. oobeSystem B. windowsPE C. specialize D. offlineServicing
A ________ is an application with which you can create, edit, and format text documents
A) word processor B) spreadsheet application C) database D) presentation application
A password-cracking attempt that checks all possible keys to decrypt data is called a brute force attack
Indicate whether the statement is true or false.
____ is an authentication protocol designed to work on client/server networks that use secret or symmetric cryptography.?
A. ?Kerberos B. ?DES C. ?3DES D. ?AES