A ____ is a representation of the security policy of the OS.
A. security plan
B. security tree
C. security infrastructure
D. security model
Answer: D
You might also like to view...
The ______ is the interface for managing scenarios.
Fill in the blank(s) with the appropriate word(s).
The central principle of the design method is to provide the client with more than one concept
Indicate whether the statement is true or false
The PList Format Files on a Mac computer can be thought of as the equivalent of ________ files on a Windows computer
Fill in the blank(s) with the appropriate word(s).
COGNITIVE ASSESSMENT Which of the following statements is not true about backing up?
A. Backup programs are available from many sources. B. Continuous data protection typically is used only by large enterprises. C. With a selective backup, all of the files in the computer automatically are chosen to be copied. D. A backup is a duplicate of a file, program, or disk.