________ is a United Nations agency that produces recommendations with a view to standardizing telecommunication on a worldwide basis.

A) ODCA
B) ITU-T
C) ETSI
D) ONF


B) ITU-T

Computer Science & Information Technology

You might also like to view...

The Share Workbook command is on the ________ tab

Fill in the blank(s) with correct word

Computer Science & Information Technology

Why should the imaging of drives always be initiated by booting the suspect drive from a previously verified forensic floppy?

a. New floppy drives bear the danger of being virus carriers. b. A previously verified forensic floppy can detect anomalies in the drive faster. c. Some users will configure their system to erase/modify data if third-party access is determined. d. The verified forensic floppy can disable the write-blocking program found on most original media.

Computer Science & Information Technology

What type of tool can identify the performance bottlenecks in an executing path?

A. profiling B. IDE C. code repository D. code scanner

Computer Science & Information Technology

To do ARP Poisoning, why does the attacker have to send a continuous stream of unrequested ARP replies?

A. All hosts would automatically detect the attacker otherwise. B. All host would crash otherwise. C. All hosts would quickly resolve the true MAC addresses of all other hosts on the network otherwise. D. All hosts would lose network connection otherwise.

Computer Science & Information Technology