Probing your network for security flaws should occur once a quarter, and a complete audit of your security should be completed ________ per year

a. Once
b. Twice
c. Three times
d. None of the above


Answer A. This would include probing your ports.

Computer Science & Information Technology

You might also like to view...

What is a class?

A. a set of characteristics and behaviors that define an object. B. a job description. C. A and B. D. none of the above.

Computer Science & Information Technology

To make a different worksheet active, you right-click the worksheet scroll arrows and select the worksheet in the Activate dialog box

Indicate whether the statement is true or false.

Computer Science & Information Technology

When you select a ____ in an Access 2010 database, you apply the same color scheme, fonts, and styles to your forms and reports.

A. style B. wizard C. theme D. control

Computer Science & Information Technology

The column feature is often used to create the layout for brochures.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology