HTTP is considered to be a(n) ___________ protocol.

A. cookie
B. FTP
C. persistent
D. stateless


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following is true about an NIDPS versus an HIDPS?

A. an NIDPS can determine if a host attack was successful B. an HIDPS can detect attacks not caught by an NIDPS C. an HIDPS can detect intrusion attempts on the entire network D. an NIDPS can compare audit log records

Computer Science & Information Technology

In an Access database, all field types include a field size property.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Stream method findFirst is a short-circuiting terminal operation that processes the stream pipeline and terminates processing as soon as the first object from the stream pipeline is found. The method returns a(n) ________ containing the object that was found, if any.

a. Optional b. Discretionary c. Elective d. Extra

Computer Science & Information Technology

A __________ is a dedicated computer that interfaces with computers outside a network and has special security precautions built into it in order to protect sensitive files on computers within the network.

A) firewall B) ACL C) matrix D) guard

Computer Science & Information Technology