The ________ Act passed by the U.S. Congress in 1986 made it a crime to access classified information.
A) USA PATRIOT
B) Cyber Security Enhancement
C) Computer Fraud and Abuse
D) Cybersecurity
Ans: C) Computer Fraud and Abuse
You might also like to view...
Put the following equations into the slop-intercept form (y = + b) and read the value of the slope and y-intercept.
2y-+x+ 1 =y—x+ 2 y(--- 2)x+ I Slope = — 2
Each data type is a class from which a variable can be ____.
A. instantiated
B. inferred
C. copied
D. implied
Martha works as a network administrator for uCertify Inc. The company's database is heavily read oriented. She is trying to select the best method for handling the situation of a hard drive crashing, which should also be a cost effective option that can provide both performance and redundancy. Which of the following RAID levels should Martha use?
A) RAID 10 B) RAID 0 C) RAID 5 D) RAID 3
Which three factors should an Administrator take into account when determining the required VDP appliance size and number of appliances? (Choose three.)
A. retention periods (daily, weekly, monthly, yearly) B. VMs guest OS family and version C. typical change rate D. Number and type (database, file system) of VMs