________ entails investigating the IT security of external companies and the implications of close IT partnerships before implementing interconnectivity.

A. Due diligence
B. Vulnerability testing
C. Peer-to-peer security
D. Auditing


A. Due diligence

Computer Science & Information Technology

You might also like to view...

____ layouts work well for sites that need to be accessible to users with assistive devices and impaired vision.

A. Liquid B. Elastic C. Fixed-width D. Indexed

Computer Science & Information Technology

To share files between computers on a Windows home network, you must

a. enablegroupsharing. b. create a homegroup. c. enable Windows sharing. d. none of the above

Computer Science & Information Technology

When you save an RTF file, you might want to change the file type to a Word document in order to make formatting and editing easier

Indicate whether the statement is true or false

Computer Science & Information Technology

Office Mix creates video clips in two ways: __________. ?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology