Which of the following types of data encryption would Jane, a security administrator, use if MBR and the file systems needed to be included?

A. Full disk
B. Individual files
C. Database
D. Partial disk


Answer: A. Full disk

Computer Science & Information Technology

You might also like to view...

The __________ is responsible for allocating space on disk.

a. IOCS b. device manager c. file system d. user

Computer Science & Information Technology

To handle the mouse click event on a pane p, register the handler with p using ______.

a. p.setOnMouseClicked(handler); b. p.setOnMouseDragged(handler); c. p.setOnMouseReleased(handler); d. p.setOnMousePressed(handler);

Computer Science & Information Technology

Which of the following is not generally a characteristic of a well-designed benchmark?

a) Multiple iterations of the benchmark on the same system should produce nearly the same results. b) The benchmark should be able to test for "what-if" scenarios, such as how adding a new Web site will affect a Web server's performance. c) The benchmark should accurately reflect the types of applications that are intended to run on the given system for which the benchmark is being used to evaluate. d) The benchmark should be widely used to provide a good basis of comparison.

Computer Science & Information Technology

COGNITIVE ASSESSMENT When you use a credit card to purchase an item, what are you interacting with?

A. a TPS B. a CMS C. an EFT D. an MMS

Computer Science & Information Technology