Which of the following options gives you the most security?

A. Download updates, but do not automatically install
B. Install updates automatically
C. Check for updates, but do not download them
D. Do not update


Answer: B

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1: The execute permission (x) on a directory file is the same as for the ordinary file, and means you can execute the directory file. 2: The crypt command is used to encrypt sensitive files. 3: The super user is any user whose password is super. 4: Only a super user can read an encrypted file. 5: The super user has access to the system files only, and not the users' files.

Computer Science & Information Technology

PDF files can only be read using the Adobe Reader program

Indicate whether the statement is true or false

Computer Science & Information Technology

You have recently been hired by your company as a security analyst. As part of your first job tasks, you meet with management regarding the lack of governance for solution designs. As a result of this lack of governance, there are inconsistencies and varying levels of quality for the artifacts that are produced. Which of the following will help BEST improve this situation?

A. Ensure that appropriate representation from each relevant discipline approves of the solution documents before official approval. B. Introduce a peer review and presentation process that includes a review board with representation from relevant disciplines. C. Ensure that management must provide official approval of all documents. D. Ensure that personnel producing solution artifacts are reminded that quality is important.

Computer Science & Information Technology

Select the correct set of options. These are the initial settings for the default security group:

A. Allow no inbound traffic, Allow all outbound traffic and Allow instances associated with this security group to talk to each other B. Allow all inbound traffic, Allow no outbound traffic and Allow instances associated with this security group to talk to each other C. Allow no inbound traffic, Allow all outbound traffic and Does NOT allow instances associated with this security group to talk to each other D. Allow all inbound traffic, Allow all outbound traffic and Does NOT allow instances associated with this security group to talk to each other

Computer Science & Information Technology