What strategy contributes most to system recovery?

A. authentication
B. integrity checking
C. data replication
D. encryption


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following functions changes the default database?

a. mysqli_query() b. mysqli_select_db() c. mysqli_connect() d. mysqli_switch()

Computer Science & Information Technology

Character constants are enclosed in double quotes (").

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The term ____ refers to an e-business that gathers and organizes large amounts of data and information, and then acts as an intermediary between those who want the information and those who supply the information.

A. infomediary B. dedicated hosting C. content delivery network D. niche market

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. A user program executes in a kernel mode in which certain areas of memory are protected from the user’s use and certain instructions may not be executed. 2. Any program that is owned by, and SetUID to, the “superuser” potentially grants unrestricted access to the system to any user executing that program. 3. Traditional RBAC systems define the access rights of individual users and groups of users. 4. A constraint is a defined relationship among roles or a condition related to roles. 5. An ABAC model can define authorizations that express conditions on properties of both the resource and the subject.

Computer Science & Information Technology