The key principle in preventing disruption, destruction and disaster is ___________.
a. redundancy
b. control spreadsheet
c. IDS
d. anti-virus software
e. prevention controls
Answer: a. redundancy
You might also like to view...
Total work is calculated based on the initial resource assignment and is not recalculated when the task duration changes.
Answer the following statement true (T) or false (F)
A collection of related data fields is called a
a. byte b. record c. character d. bit
A client-side attack that involves the attacker placing an invisible layer over something on a website that the user would normally click on, in order to execute a command differing from what the user thinks they are performing, is known as ___________.
A. Tailgating B. Clickjacking C. Phishing D. Spear phishing E. Cross-site request forgery
When you create a hyperlink with text, the hyperlink is automatically named using the first word or words in the selected text.
Answer the following statement true (T) or false (F)