All of the following would be examples of ways to increase security on a network EXCEPT ________

A) installing bio metric equipment
B) disabling e-mail
C) setting up usernames and passwords
D) giving only a few users permission to view sensitive files


B

Computer Science & Information Technology

You might also like to view...

Named anchors, as shown in the accompanying figure, should contain only ____.

A. uppercase characters B. alphanumeric characters C. lowercase characters D. special characters

Computer Science & Information Technology

What is the protocol developed by Cisco for enterprise-wide routing environments?

A. RIP B. OSPF C. BGP D. EIGRP

Computer Science & Information Technology

User agents render HTML documents from bottom to top.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When you choose one of the options to send a worksheet via e-mail, a message opens in Microsoft Outlook with your workbook attached.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology