A(n) ____ search seeks specific information using keyword combinations.
A. targeted
B. open-ended
C. meta tag
D. natural language
Answer: A
You might also like to view...
The file extension for an Excel Macro-Enabled Workbook is .xltm.
Answer the following statement true (T) or false (F)
When the records in a file are sorted in order from lowest to highest values, the records are in ____ order.
A. descending B. bubble C. ascending D. merged
You are tasked with securing a small network for a client in which the following requirements must be met: • If a user on the private network attempts to send confidential company information to an unauthorized entity, an alert should be triggered. • The private trusted network should not be accessible from the public untrusted network. • If attacks are coming from the external network, the system should detect and prevent malicious activity. • All incoming and outgoing email should be scanned for malware. Which of the following would best meet the requirements of the client?
A. Implement a firewall. B. Implement an IPS. C. Implement a UTM appliance. D. Implement identity-based ACLs. E. Implement an IDS.
Calling a Web ____________________ is a way of sending and receiving information across the Internet.
Fill in the blank(s) with the appropriate word(s).