What strategy contributes most to system recovery?
A. authentication
B. integrity checking
C. data replication
D. encryption
Answer: C
You might also like to view...
Which of the following functions changes the default database?
a. mysqli_query() b. mysqli_select_db() c. mysqli_connect() d. mysqli_switch()
Character constants are enclosed in double quotes (").
Answer the following statement true (T) or false (F)
The term ____ refers to an e-business that gathers and organizes large amounts of data and information, and then acts as an intermediary between those who want the information and those who supply the information.
A. infomediary B. dedicated hosting C. content delivery network D. niche market
Answer the following statements true (T) or false (F)
1. A user program executes in a kernel mode in which certain areas of memory are protected from the user’s use and certain instructions may not be executed. 2. Any program that is owned by, and SetUID to, the “superuser” potentially grants unrestricted access to the system to any user executing that program. 3. Traditional RBAC systems define the access rights of individual users and groups of users. 4. A constraint is a defined relationship among roles or a condition related to roles. 5. An ABAC model can define authorizations that express conditions on properties of both the resource and the subject.