A ____ is a representation of the security policy of the OS.

A. security plan
B. security tree
C. security infrastructure
D. security model


Answer: D

Computer Science & Information Technology

You might also like to view...

The ______ is the interface for managing scenarios.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The central principle of the design method is to provide the client with more than one concept

Indicate whether the statement is true or false

Computer Science & Information Technology

The PList Format Files on a Mac computer can be thought of as the equivalent of ________ files on a Windows computer

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

COGNITIVE ASSESSMENT Which of the following statements is not true about backing up?

A. Backup programs are available from many sources. B. Continuous data protection typically is used only by large enterprises. C. With a selective backup, all of the files in the computer automatically are chosen to be copied. D. A backup is a duplicate of a file, program, or disk.

Computer Science & Information Technology