Probing your network for security flaws should occur once a quarter, and a complete audit of your security should be completed ________ per year
a. Once
b. Twice
c. Three times
d. None of the above
Answer A. This would include probing your ports.
Computer Science & Information Technology
You might also like to view...
What is a class?
A. a set of characteristics and behaviors that define an object. B. a job description. C. A and B. D. none of the above.
Computer Science & Information Technology
To make a different worksheet active, you right-click the worksheet scroll arrows and select the worksheet in the Activate dialog box
Indicate whether the statement is true or false.
Computer Science & Information Technology
When you select a ____ in an Access 2010 database, you apply the same color scheme, fonts, and styles to your forms and reports.
A. style B. wizard C. theme D. control
Computer Science & Information Technology
The column feature is often used to create the layout for brochures.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology