Which of the following is a common local security policy?
A. Use of RAID
B. Password length
C. Router passwords
D. Use of a password to log in
Answer: B. Password length
You might also like to view...
Which device is the openSUSE default installation medium?
A. Hard drive B. USB C. Network D. CD-ROM
____ is used to describe the relationship between two objects of the same class, such as one person being married to another person.
A. ?Binary association ?B. Unary association ?C. Cardinality ?D. N-ary association
When it is necessary to calculate, estimate, or derive values for information assets, you might give consideration to the value incurred from the cost of protecting the information.
Answer the following statement true (T) or false (F)
In WEP, the ____ is a cyclic redundancy check (CRC) value calculated with a checksum based on the contents of the text.
A. initialization vector (IV) B. pseudo-random number generator (PRNG) C. integrity check value (ICV) D. RC4