HTTP is considered to be a(n) ___________ protocol.
A. cookie
B. FTP
C. persistent
D. stateless
Answer: D
You might also like to view...
Which of the following is true about an NIDPS versus an HIDPS?
A. an NIDPS can determine if a host attack was successful B. an HIDPS can detect attacks not caught by an NIDPS C. an HIDPS can detect intrusion attempts on the entire network D. an NIDPS can compare audit log records
In an Access database, all field types include a field size property.
Answer the following statement true (T) or false (F)
Stream method findFirst is a short-circuiting terminal operation that processes the stream pipeline and terminates processing as soon as the first object from the stream pipeline is found. The method returns a(n) ________ containing the object that was found, if any.
a. Optional b. Discretionary c. Elective d. Extra
A __________ is a dedicated computer that interfaces with computers outside a network and has special security precautions built into it in order to protect sensitive files on computers within the network.
A) firewall B) ACL C) matrix D) guard