In a ____ configuration, all peer trust anchors are potentially cross-certified among each other.

A. hub configuration
B. line configuration
C. mesh configuration
D. star configuration


Answer: C

Computer Science & Information Technology

You might also like to view...

A variable that keeps a running total of data values is called a(n)

A) total. B) sum. C) accumulator. D) counter. E) loop control variable.

Computer Science & Information Technology

A ________ drive is often located on another computer and is accessible to other users

A) root B) flash C) local D) network

Computer Science & Information Technology

Why is the efficiency of algorithms desirable?

A. an inefficient algorithm may use too much time or space B. efficient algorithms always cost less money C. inefficient algorithms always use too much memory D. efficient algorithms always use less memory

Computer Science & Information Technology

The format of numbers displayed by printf() can be controlled by field width specifiers included as part of each conversion control sequence.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology