A mask layer ____.

A. hides the contents of the layer below it
B. can be used to create a highlight effect
C. both a. and b.
D. neither a. nor b.


Answer: C

Computer Science & Information Technology

You might also like to view...

The web is based on the ________ Protocol

A) Hypertext Trade B) Hypertext Transmit C) Hypertext Translate D) Hypertext Transfer

Computer Science & Information Technology

The majority of the work involving device implementation, management, and troubleshooting for many types of hardware devices is done in the Device Manager utility

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following are typically found within the DMZ?

a. FTP servers b. Email servers c. Web servers d. All the above

Computer Science & Information Technology

Your company is preparing to upgrade their intrusion detection systems (IDSs) at three locations in the southeast United States. Three vendors have submitted RFP responses that you must evaluate. Each of the three vendor's RFP responses is in-line with the security and other requirements. What should you do to ensure the IDS platform is appropriate for your company?

A. Develop criteria and rate each IDS based on information in the RFP responses. B. Create a lab environment to evaluate each of the three IDSs. C. Benchmark each IDS's capabilities and experiences with similar sized companies. D. Correlate current industry research with the RFP responses to ensure validity.

Computer Science & Information Technology