Which type of security measure reduces the effect of an attack by using data backups, disaster recovery plans, and the availability of redundant hardware devices?

A. Corrective procedures
B. Preventive countermeasures
C. Detection activities
D. Deterrents


Answer: A

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Access to high-speed communication lines (such as cable) calls for a cable modem. 2. Some peripheral devices are linked directly to the processor. 3. A buffer is temporary memory or storage used to adjust for the speed differential between the processor and memory. 4. Certain functions (for example, deciding where the next byte can be found or stored in memory and counting the characters transferred to or from an external device) are common to almost all types of input and output. On larger machines, they are performed by each interface; in effect, they are duplicated for each device on the system. 5. On a mainframe computer, a channel handles device-independent functions and device- dependent functions are implemented through I/O control units or interface units.

Computer Science & Information Technology

What exception is thrown if the pop method is called on an empty stack, implemented using the ArrayStack class?

a) EmptyStackException b) NoSuchElementException c) ArrayOutOfBoundsException d) EmptyCollectionException e) none of the above

Computer Science & Information Technology

A Trojan horse can perform which of the following actions?

A) Erase files on a computer. B) Launch a DDoS attack. C) Install a backdoor on a computer. D) All of the above

Computer Science & Information Technology

Which of these is a reason for an organization to participate in open source communities?

A) to maintain mutually beneficial relationships with other software developers B) to keep down the development costs on a project C) to increase productivity by leveraging a committed group of developers D) All of the above.

Computer Science & Information Technology