What should you reduce in order to limit the number of security vulnerabilities in a system?

A. password complexity
B. the number of logins
C. surface area
D. antivirus programs


Answer: C

Computer Science & Information Technology

You might also like to view...

A(n) ____ operation permits an event handler to determine the kind of component that generated an event, and then take a different action for each kind of component.

A. assignment B. instanceof C. cast D. referencing

Computer Science & Information Technology

ADTs should be in separate files because

a. This promotes information hiding b. This promotes data abstraction c. This promotes software reusability d. This results in faster recompilation e. All of the above f. None of the above

Computer Science & Information Technology

A sequence of 0s and 1s is called a decimal code.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Text values are aligned at the ________ cell edge

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology