Which of the following is a security approach that blocks users from visiting any website or Internet resource except those on an approved list?

A) Black listing
B) White listing
C) Gray listing
D) None of the above


B) White listing

Computer Science & Information Technology

You might also like to view...

To switch to code view, select

a) Code > View b) Design > Code c) View > Code d) View > File Code

Computer Science & Information Technology

In the U.S., if a consumer finds a problem on her credit report, she must first send a letter to the credit-reporting agency. Under federal law, how many days does the agency have to investigate and respond to the alleged inaccuracy and issue a corrected report?

A. 15 B. 30 C. 45 D. 60

Computer Science & Information Technology

Which of the following features should be used if you want to keep an entire date together on the same line, for example June 21, 2014?

A) Nonbreaking space B) Hyphenation C) Kerning D) Nonbreaking hyphenation

Computer Science & Information Technology

How can you improve the efficiency of a nested decision?

What will be an ideal response?

Computer Science & Information Technology